Read more
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
List of contents
Part I: Enabling Security through User Authentication.- Current Use of User Authentication.- The Evolving Technological Landscape.- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches.- Intrusive Authentication Approaches.- Transparent Techniques.- Multibiometrics.- Biometric Standards.- Part III: System Design, Development and Implementation Considerations.- Theoretical Requirements of a Transparent Authentication System.- Implementation Considerations in Ubiquitous Networks.- Evolving Technology and the Future for Authentication.
Summary
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication – where authentication credentials are captured during a user’s normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
Additional text
From the reviews:
“This book is worth reading. … Clarke provides an architectural description with many tradeoffs that may help in building such a system. This book, with its clear focus on transparent authentication, brings together a lot of ideas and insights.” (A. Mariën, ACM Computing Reviews, March, 2012)
Report
From the reviews:
"This book is worth reading. ... Clarke provides an architectural description with many tradeoffs that may help in building such a system. This book, with its clear focus on transparent authentication, brings together a lot of ideas and insights." (A. Mariën, ACM Computing Reviews, March, 2012)