Cache Cookies for Browser Authentication (Extended Abstract)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
The Journal of Supercomputing
Hi-index | 0.00 |
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints and practical computational and power limitations, which must be respected by mobile security technologies in order to be effective. We describe how cloud computing can address these issues. Our approach is based on a flexible framework for supporting authentication decisions we call TrustCube (to manage the authentication infrastructure) and on a behavioral authentication approach referred to as implicit authentication (to translate user behavior into authentication scores). The combination results in a new authentication paradigm for users of mobile technologies, one where an appropriate balance between usability and trust can be managed through flexible policies and dynamic tuning.