Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Active behavior as a fourth dimensio...
~
Hekimian, Christopher David.
Linked to FindBook
Google Book
Amazon
博客來
Active behavior as a fourth dimension to identity authentication in computer systems.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Active behavior as a fourth dimension to identity authentication in computer systems./
Author:
Hekimian, Christopher David.
Description:
360 p.
Notes:
Source: Dissertation Abstracts International, Volume: 65-02, Section: B, page: 0838.
Contained By:
Dissertation Abstracts International65-02B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3123108
Active behavior as a fourth dimension to identity authentication in computer systems.
Hekimian, Christopher David.
Active behavior as a fourth dimension to identity authentication in computer systems.
- 360 p.
Source: Dissertation Abstracts International, Volume: 65-02, Section: B, page: 0838.
Thesis (D.Sc.)--The George Washington University, 2004.
Identity authentication systems for computerized systems have been traditionally based upon three independent concepts which are best described as "What You Know" (passwords, PINs), "What You Have" (smart card, ID badge), and "What You Are", (biometric and natural behavior based systems). A fourth dimension to authentication is also possible: the deliberate perturbation of natural behavior in an authentication test. Conceptually, the use of active behavior could provide an inexpensive addition to existing authentication processes to make them more secure.Subjects--Topical Terms:
626642
Computer Science.
Active behavior as a fourth dimension to identity authentication in computer systems.
LDR
:02828nmm 2200301 4500
001
1865710
005
20041222104213.5
008
130614s2004 eng d
035
$a
(UnM)AAI3123108
035
$a
AAI3123108
040
$a
UnM
$c
UnM
100
1
$a
Hekimian, Christopher David.
$3
1953137
245
1 0
$a
Active behavior as a fourth dimension to identity authentication in computer systems.
300
$a
360 p.
500
$a
Source: Dissertation Abstracts International, Volume: 65-02, Section: B, page: 0838.
500
$a
Director: Julie Joyce Charity Hughes Ryan.
502
$a
Thesis (D.Sc.)--The George Washington University, 2004.
520
$a
Identity authentication systems for computerized systems have been traditionally based upon three independent concepts which are best described as "What You Know" (passwords, PINs), "What You Have" (smart card, ID badge), and "What You Are", (biometric and natural behavior based systems). A fourth dimension to authentication is also possible: the deliberate perturbation of natural behavior in an authentication test. Conceptually, the use of active behavior could provide an inexpensive addition to existing authentication processes to make them more secure.
520
$a
In this research, this fourth dimension of active behavior is developed theoretically and then tested experimentally to determine its practical applicability in a real world environment. Aspects that were examined include usability, acceptability, effectiveness, and administration requirements. A critical question was whether the use of active behavior could be used to advantage in effectiveness and acceptability, without incurring an excessive penalty on overall system usability.
520
$a
The results of the research indicate that while active behavior can be used effectively as an authentication process, there are several disadvantages associated with its use. Active behavior overlays on conventional systems impart an additional level of isolation between valued information assets and compromise at the hands of would be attackers. Disadvantages include those associated with increased memory requirements on behalf of the user. Testing using the password-based active behavior test bed system revealed the existence of a practical entropy significantly lower than the authentication system entropy that would be calculated based upon mathematical probability alone. Future research could explore how the practical entropy and its limits might be extended closer to those of the theoretical entropy.
590
$a
School code: 0075.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
650
4
$a
Engineering, System Science.
$3
1018128
690
$a
0984
690
$a
0544
690
$a
0790
710
2 0
$a
The George Washington University.
$3
1017405
773
0
$t
Dissertation Abstracts International
$g
65-02B.
790
1 0
$a
Ryan, Julie Joyce Charity Hughes,
$e
advisor
790
$a
0075
791
$a
D.Sc.
792
$a
2004
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3123108
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9184586
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login