Difference between revisions of "Progressive Authentication"
From MgmtWiki
(→Context) |
|||
Line 8: | Line 8: | ||
An anti-use case was discovered when the NSA funded the Blacker | An anti-use case was discovered when the NSA funded the Blacker | ||
− | When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref> | + | When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref> for mobile devices and later specifically for Android devices.<ref>Jeffrey Warren, +3, ''Progressive Authentication on Android'' https://css.csail.mit.edu/6.858/2013/projects/jtwarren-vkgdaddy-vedha-vvelaga.pdf</ref> |
==Problems== | ==Problems== |
Revision as of 19:53, 14 June 2018
Full Definition or Meme
When the exact nature of the user request is unknown, it is best to authentication in the least obtrusive manner, which is typically not at the highest level they might need later in the interchange.
Context
Then general use case[1] is where trust elevation must occur during the
An anti-use case was discovered when the NSA funded the Blacker
When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed[2] for mobile devices and later specifically for Android devices.[3]
Problems
Solutions
References
- ↑ Tom Jones Trust Elevation Use Case https://wiki.idesg.org/wiki/index.php?title=Trust_Elevation_Use_Case
- ↑ Oriana Riva +3 Progressive authentication: deciding when to authenticate on mobile phones Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012
- ↑ Jeffrey Warren, +3, Progressive Authentication on Android https://css.csail.mit.edu/6.858/2013/projects/jtwarren-vkgdaddy-vedha-vvelaga.pdf