Skip to main content

2018 | OriginalPaper | Buchkapitel

Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources Acquisition

verfasst von : Mei-Yu Wu, Chih-Kun Ke, Ming-Ru Lee

Erschienen in: Advances in Computer Science and Ubiquitous Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As a result of the massive growth and ubiquity of wireless networks, smart phones have become both a popular and indispensable part of modern life. Many services are offered via smart phone, such as entrance guard systems and mobile wallets. Traditional authentication mechanisms use usernames and passwords to verify user identity, however, in order to ensure sufficiently high security, passwords must be changed regularly. Although some mobile phones have near field communication (NFC) technology, which does away with the need for username and password authentication, NFC only recognizes NFC cards, and does not recognize people. Thus information security is still an issue in such systems. This study combines NFC and biometric identity verification technology to achieve authentication in these situations. In addition, the proposed model combines role-based access control to authorize suitable permissions to users. The proposed model achieves ubiquitous and comprehensive authentication and authorization management for enterprise resources.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Beika, Z., Bernd, K.: A multi-context visual web page authoring tool. In: The 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada (2005) Beika, Z., Bernd, K.: A multi-context visual web page authoring tool. In: The 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada (2005)
2.
Zurück zum Zitat Cao, K.: Federated Single-Sign On (SSO) approach for enterprise system. Master thesis. Aalto University, Finland (2014) Cao, K.: Federated Single-Sign On (SSO) approach for enterprise system. Master thesis. Aalto University, Finland (2014)
3.
Zurück zum Zitat Cavoukian, A.: Mobile near field communications: keep it secure and private. ISSA J. 12–17 (2012) Cavoukian, A.: Mobile near field communications: keep it secure and private. ISSA J. 12–17 (2012)
4.
Zurück zum Zitat Ceipidor, U.B., Medaglia, C.M., Marino, A., Morena, M., Sposato, S., Moroni, A., Di Rollo, P., Morgia, M.L.: Mobile ticketing with NFC management for transport companies. Problems and solutions. In: The 5th International Workshop on Near Field Communication (NFC2013), Zurich, Switzerland (2013) Ceipidor, U.B., Medaglia, C.M., Marino, A., Morena, M., Sposato, S., Moroni, A., Di Rollo, P., Morgia, M.L.: Mobile ticketing with NFC management for transport companies. Problems and solutions. In: The 5th International Workshop on Near Field Communication (NFC2013), Zurich, Switzerland (2013)
5.
Zurück zum Zitat Dey, A.K.: Understanding and using context. J. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef Dey, A.K.: Understanding and using context. J. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef
6.
Zurück zum Zitat Dodson, B., Lam, M.S.: Micro-interactions with NFC-enabled mobile phones. In: The Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, USA (2011) Dodson, B., Lam, M.S.: Micro-interactions with NFC-enabled mobile phones. In: The Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, USA (2011)
7.
Zurück zum Zitat Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role Based Access Control (RBAC): features and motivations. In: IEEE Computer Security Applications Conference, New Orleans. Louisiana, USA, pp. 241–248 (1995) Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role Based Access Control (RBAC): features and motivations. In: IEEE Computer Security Applications Conference, New Orleans. Louisiana, USA, pp. 241–248 (1995)
8.
Zurück zum Zitat Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRef Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRef
9.
Zurück zum Zitat Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th National Computer Security Conference. Baltimore, USA, pp. 554–563 (1992) Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th National Computer Security Conference. Baltimore, USA, pp. 554–563 (1992)
11.
Zurück zum Zitat Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)CrossRef Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)CrossRef
12.
Zurück zum Zitat Nykänen, T.: Secure Cross-Platform Single Sign-On Solution for the World-Wide Web. Department of Computer Science and Engineering, Helsinki University of Technology (2002) Nykänen, T.: Secure Cross-Platform Single Sign-On Solution for the World-Wide Web. Department of Computer Science and Engineering, Helsinki University of Technology (2002)
13.
Zurück zum Zitat Ortiz, C.E.: An Introduction to Near-Field Communication and the Contactless Communication API. Oracle Technology Network (2008) Ortiz, C.E.: An Introduction to Near-Field Communication and the Contactless Communication API. Oracle Technology Network (2008)
14.
Zurück zum Zitat Pereira, A.L.: Computing systems integration in grid computing and cloud computing. In: IEEE International Parallel & Distributed Processing Symposium, Anchorage, US (2011) Pereira, A.L.: Computing systems integration in grid computing and cloud computing. In: IEEE International Parallel & Distributed Processing Symposium, Anchorage, US (2011)
15.
Zurück zum Zitat Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRef
16.
Zurück zum Zitat Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: The Third ACM Workshop on Role-Based Access Control, New York, USA, pp. 47–54 (1998) Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: The Third ACM Workshop on Role-Based Access Control, New York, USA, pp. 47–54 (1998)
17.
Zurück zum Zitat Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef
18.
Zurück zum Zitat Samar, V.: Single sign-on using cookies for web applications. In: The IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, California, USA, pp. 158–163 (1999) Samar, V.: Single sign-on using cookies for web applications. In: The IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, California, USA, pp. 158–163 (1999)
19.
Zurück zum Zitat Tatepamulwar, C.B., Pawar, V.P.: Comparison of biometric trends based on different criteria. Asian J. Manag. Sci. 2(3), 159–165 (2014) Tatepamulwar, C.B., Pawar, V.P.: Comparison of biometric trends based on different criteria. Asian J. Manag. Sci. 2(3), 159–165 (2014)
Metadaten
Titel
Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources Acquisition
verfasst von
Mei-Yu Wu
Chih-Kun Ke
Ming-Ru Lee
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_176

Neuer Inhalt