Skip to main content
Top

2018 | OriginalPaper | Chapter

Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources Acquisition

Authors : Mei-Yu Wu, Chih-Kun Ke, Ming-Ru Lee

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As a result of the massive growth and ubiquity of wireless networks, smart phones have become both a popular and indispensable part of modern life. Many services are offered via smart phone, such as entrance guard systems and mobile wallets. Traditional authentication mechanisms use usernames and passwords to verify user identity, however, in order to ensure sufficiently high security, passwords must be changed regularly. Although some mobile phones have near field communication (NFC) technology, which does away with the need for username and password authentication, NFC only recognizes NFC cards, and does not recognize people. Thus information security is still an issue in such systems. This study combines NFC and biometric identity verification technology to achieve authentication in these situations. In addition, the proposed model combines role-based access control to authorize suitable permissions to users. The proposed model achieves ubiquitous and comprehensive authentication and authorization management for enterprise resources.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Beika, Z., Bernd, K.: A multi-context visual web page authoring tool. In: The 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada (2005) Beika, Z., Bernd, K.: A multi-context visual web page authoring tool. In: The 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada (2005)
2.
go back to reference Cao, K.: Federated Single-Sign On (SSO) approach for enterprise system. Master thesis. Aalto University, Finland (2014) Cao, K.: Federated Single-Sign On (SSO) approach for enterprise system. Master thesis. Aalto University, Finland (2014)
3.
go back to reference Cavoukian, A.: Mobile near field communications: keep it secure and private. ISSA J. 12–17 (2012) Cavoukian, A.: Mobile near field communications: keep it secure and private. ISSA J. 12–17 (2012)
4.
go back to reference Ceipidor, U.B., Medaglia, C.M., Marino, A., Morena, M., Sposato, S., Moroni, A., Di Rollo, P., Morgia, M.L.: Mobile ticketing with NFC management for transport companies. Problems and solutions. In: The 5th International Workshop on Near Field Communication (NFC2013), Zurich, Switzerland (2013) Ceipidor, U.B., Medaglia, C.M., Marino, A., Morena, M., Sposato, S., Moroni, A., Di Rollo, P., Morgia, M.L.: Mobile ticketing with NFC management for transport companies. Problems and solutions. In: The 5th International Workshop on Near Field Communication (NFC2013), Zurich, Switzerland (2013)
5.
go back to reference Dey, A.K.: Understanding and using context. J. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef Dey, A.K.: Understanding and using context. J. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef
6.
go back to reference Dodson, B., Lam, M.S.: Micro-interactions with NFC-enabled mobile phones. In: The Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, USA (2011) Dodson, B., Lam, M.S.: Micro-interactions with NFC-enabled mobile phones. In: The Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, USA (2011)
7.
go back to reference Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role Based Access Control (RBAC): features and motivations. In: IEEE Computer Security Applications Conference, New Orleans. Louisiana, USA, pp. 241–248 (1995) Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role Based Access Control (RBAC): features and motivations. In: IEEE Computer Security Applications Conference, New Orleans. Louisiana, USA, pp. 241–248 (1995)
8.
go back to reference Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRef Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRef
9.
go back to reference Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th National Computer Security Conference. Baltimore, USA, pp. 554–563 (1992) Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th National Computer Security Conference. Baltimore, USA, pp. 554–563 (1992)
11.
go back to reference Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)CrossRef Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)CrossRef
12.
go back to reference Nykänen, T.: Secure Cross-Platform Single Sign-On Solution for the World-Wide Web. Department of Computer Science and Engineering, Helsinki University of Technology (2002) Nykänen, T.: Secure Cross-Platform Single Sign-On Solution for the World-Wide Web. Department of Computer Science and Engineering, Helsinki University of Technology (2002)
13.
go back to reference Ortiz, C.E.: An Introduction to Near-Field Communication and the Contactless Communication API. Oracle Technology Network (2008) Ortiz, C.E.: An Introduction to Near-Field Communication and the Contactless Communication API. Oracle Technology Network (2008)
14.
go back to reference Pereira, A.L.: Computing systems integration in grid computing and cloud computing. In: IEEE International Parallel & Distributed Processing Symposium, Anchorage, US (2011) Pereira, A.L.: Computing systems integration in grid computing and cloud computing. In: IEEE International Parallel & Distributed Processing Symposium, Anchorage, US (2011)
15.
go back to reference Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef
16.
go back to reference Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: The Third ACM Workshop on Role-Based Access Control, New York, USA, pp. 47–54 (1998) Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: The Third ACM Workshop on Role-Based Access Control, New York, USA, pp. 47–54 (1998)
17.
go back to reference Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef
18.
go back to reference Samar, V.: Single sign-on using cookies for web applications. In: The IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, California, USA, pp. 158–163 (1999) Samar, V.: Single sign-on using cookies for web applications. In: The IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, California, USA, pp. 158–163 (1999)
19.
go back to reference Tatepamulwar, C.B., Pawar, V.P.: Comparison of biometric trends based on different criteria. Asian J. Manag. Sci. 2(3), 159–165 (2014) Tatepamulwar, C.B., Pawar, V.P.: Comparison of biometric trends based on different criteria. Asian J. Manag. Sci. 2(3), 159–165 (2014)
Metadata
Title
Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources Acquisition
Authors
Mei-Yu Wu
Chih-Kun Ke
Ming-Ru Lee
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_176