2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) 2020
DOI: 10.1109/tps-isa50397.2020.00034
|View full text |Cite
|
Sign up to set email alerts
|

AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization

Abstract: In this paper, we propose a novel, privacypreserving, and integrated authentication and authorization scheme (dubbed as AuthN-AuthZ). The proposed scheme can address both the usability and privacy issues often posed by authentication through use of privacy-preserving Biometric-Capsule-based authentication. Each Biometric-Capsule encapsulates a user's biometric template as well as their role within a hierarchical Role-based Access Control model. As a result, AuthN-AuthZ provides novel efficiency by performing b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…There is discussion of many access control models that aim to combine authorization with authentication, such as Mandatory Access Control (MAC), Role-based Access Control (RBAC), and Discretionary Access Control (DAC). The suggested AuthN-AuthZ system uses a hierarchical RBAC model with privacy-preserving Biometric-Capsule-based authentication to solve usability and privacy concerns [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There is discussion of many access control models that aim to combine authorization with authentication, such as Mandatory Access Control (MAC), Role-based Access Control (RBAC), and Discretionary Access Control (DAC). The suggested AuthN-AuthZ system uses a hierarchical RBAC model with privacy-preserving Biometric-Capsule-based authentication to solve usability and privacy concerns [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Alternatively, the strong authentication process in a mobile environment uses a biometric element based on a fingerprint or facial scan of a user. The use of biometrics in the process of confirming a user's identity is the subject of numerous studies [10]- [13]. This method requires a device with a specific reader.…”
Section: Introductionmentioning
confidence: 99%