Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3098969
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Biometric Verification for Non-Repudiation of Remote Services

Abstract: As our society massively relies on ICT, security services are becoming essential to protect users and entities involved. Amongst such services, non-repudiation provides evidences of actions, protects against their denial, and helps solving disputes between parties. For example, it prevents denial of past behaviors as having sent or received messages. Noteworthy, if the information flow is continuous, evidences should be produced for the entirety of the flow and not only at specific points. Further, non-repudia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…The different biometric data are acquired continuously by the workstation, and the identity of the user is verified. The foundations of the devised system, that has been initially presented in [50] in a preliminary version, has been re-applied or considered as inspiration in recent works, especially [51] and [52].…”
Section: Our Approach To Continuous Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…The different biometric data are acquired continuously by the workstation, and the identity of the user is verified. The foundations of the devised system, that has been initially presented in [50] in a preliminary version, has been re-applied or considered as inspiration in recent works, especially [51] and [52].…”
Section: Our Approach To Continuous Authenticationmentioning
confidence: 99%
“…This is just an example, but areas where continuous authentication is desirable are multiple. An important category is safety critical command and control rooms, where operators are responsible for public safety, transportation, air traffic management, or in all the areas where the computer system has to be accessible only to certified and authorized users, otherwise intrusions may be the cause of severe or even catastrophic consequences [51], [52]. Let us think about a crisis management system where human operators working in a control room are in charge of analyzing and interpreting situations that describe the current status of an emergence [53].…”
Section: Introductionmentioning
confidence: 99%
“…• Non-repudiation. Non-repudiation [8] is another fundamental property which can be satisfied using blockchains, thus if it is considered a requirement, the diagram directly produces the output of the first phase of the methodology: "Blockchain RECOMMENDED". • Multiple writers.…”
Section: A Project Requirements Analysis Blockchain: Yes or No?mentioning
confidence: 99%