2015
DOI: 10.1007/978-3-319-27161-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Continuous User Identity Verification for Trusted Operators in Control Rooms

Abstract: Abstract. Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis managem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Several works exploit biometrics to implement continuous authentication schemes [20], [21], [22], [23]. Indeed, in highsecurity environments the typical session level authentication can be exposed to session hijacking in which an attacker targets a post-authenticated session.…”
Section: Related Workmentioning
confidence: 99%
“…Several works exploit biometrics to implement continuous authentication schemes [20], [21], [22], [23]. Indeed, in highsecurity environments the typical session level authentication can be exposed to session hijacking in which an attacker targets a post-authenticated session.…”
Section: Related Workmentioning
confidence: 99%
“…The security of this workplace should be granted in order to prevent the intervention of insiders: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. In our previous work [3], we proposed an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for people working in a crisis management system control room, the solution aims to guarantee authentication and, if possible, non-repudiation of operators, reducing the risk that unauthorized personnel (including intruders) misuse a workstation.…”
Section: Biometric Continuous Authentication and The Control Room Ope...mentioning
confidence: 99%
“…We developed a continuous multi-biometric authentication mechanism in which biometric data is transparently acquired from the operator and continuously verified. More details about the protocol, the architecture, the algorithm for trust level computation, the prototype realized, and the software implemented can be found in [3].…”
Section: Biometric Continuous Authentication and The Control Room Ope...mentioning
confidence: 99%