A new authentication management model oriented on user’s experience

Mariusz Sepczuk , Zbigniew Kotulski


Authenticating users connecting to online services, social networks or m-banking became an indispensable element of our everyday life. Reliable authentication is a foundation of security of Internet services but, on the other hand, also a source of users’ frustration due to possible account blocking in case of three fails. In this paper we propose a model of authentication service management which helps in keeping a balance between the authentication security level and positive users’ perception of this procedure. The proposed procedure allows a user more than three attempts of authentication by switching after two failures to a more secure authentication protocol keeping a balance between QoP and QoE measures. Finally, the procedure determines an optimal path of authentication using a decision tree algorithm.
Author Mariusz Sepczuk (FEIT / IT)
Mariusz Sepczuk,,
- The Institute of Telecommunications
, Zbigniew Kotulski (FEIT / IT)
Zbigniew Kotulski,,
- The Institute of Telecommunications
Publication size in sheets0.5
Book Ganzha Maria, Maciaszek Leszek A., Paprzycki Marcin (eds.): Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, Annals of Computer Science and Information Systems, vol. 8, 2016, Gdańsk, IEEE, ISBN 978-83-60810-90-3, [978-83-60810-91-0, 978-83-60910-92-7], 1817 p., DOI:10.15439/978-83-60810-90-3
Keywords in Englishauthentication, Quality of Experience, Quality of Protection
URL https://ieeexplore.ieee.org/document/7733371
Languageen angielski
2016 Sepczuk Kotulski A new authentication management model oriented on user’s experience.pdf 373.17 KB
Score (nominal)15
Score sourceconferenceIndex
ScoreMinisterial score = 15.0, 21-07-2020, BookChapterSeriesAndMatConfByIndicator
Ministerial score (2013-2016) = 15.0, 21-07-2020, BookChapterSeriesAndMatConfByIndicator
Publication indicators WoS Citations = 1
Citation count*
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?