Logo des Repositoriums
 

Triggering IDM authentication methods based on device capabilities information

dc.contributor.authorQuintino Kuhnen, Marcus
dc.contributor.authorLischka, Mario
dc.contributor.authorGómez Mármol, Félix
dc.contributor.editorSuri, Neeraj
dc.contributor.editorWaidner, Michael
dc.date.accessioned2018-11-19T13:11:41Z
dc.date.available2018-11-19T13:11:41Z
dc.date.issued2012
dc.description.abstractIdentity management systems are a reality today in the Internet. Single sign-on (SSO) systems allow users to authenticate once in the system and interact with different services providers without the need for creating new accounts. However, most identity management systems only support a simple authentication mechanism, which most of the cases is based on login and password, with its well known associated vulnerabilities like phishing attacks, for instance. In order to mitigate those drawbacks and improve the overall security of the system, we propose an enhancement of SSO systems which allows the identity providers to dynamically choose the best authentication method (e.g. fingerprint, digital certificates, smart cards, etc) being applied to the user based on the users' device capabilities and context information.en
dc.identifier.isbn978-3-88579-289-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/18278
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-195
dc.titleTriggering IDM authentication methods based on device capabilities informationen
dc.typeText/Conference Paper
gi.citation.endPage244
gi.citation.publisherPlaceBonn
gi.citation.startPage235
gi.conference.date7.-9. März 2012
gi.conference.locationDarmstadt
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
235.pdf
Größe:
174.92 KB
Format:
Adobe Portable Document Format