A new authentication management model oriented on user’s experience

Mariusz Sepczuk , Zbigniew Kotulski

Abstract

Authenticating users connecting to online services, social networks or m-banking became an indispensable element of our everyday life. Reliable authentication is a foundation of security of Internet services but, on the other hand, also a source of users’ frustration due to possible account blocking in case of three fails. In this paper we propose a model of authentication service management which helps in keeping a balance between the authentication security level and positive users’ perception of this procedure. The proposed procedure allows a user more than three attempts of authentication by switching after two failures to a more secure authentication protocol keeping a balance between QoP and QoE measures. Finally, the procedure determines an optimal path of authentication using a decision tree algorithm.
Author Mariusz Sepczuk IT
Mariusz Sepczuk,,
- The Institute of Telecommunications
, Zbigniew Kotulski IT
Zbigniew Kotulski,,
- The Institute of Telecommunications
Pages1041-1050
Publication size in sheets0.5
Book Ganzha Maria, Maciaszek Leszek A., Paprzycki Marcin (eds.): Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, Annals of Computer Science and Information Systems, vol. 5, 2016, IEEE, ISBN 978-83-60810-65-1, [ 978-83-60810-67-5, 978-83-60810-66-8], 1817 p., DOI:10.15439/978-83-60810-66-8 2016 fedcsis.pdf (file archived - login or check accessibility on faculty)
Keywords in Englishauthentication, Quality of Experience, Quality of Protection
Languageen angielski
File
2016 Sepczuk Kotulski A new authentication management.pdf (file archived - login or check accessibility on faculty) 2016 Sepczuk Kotulski A new authentication management.pdf 365 KB
Score (nominal)15
ScoreMinisterial score = 15.0, 27-03-2017, BookChapterSeriesAndMatConfByIndicator
Ministerial score (2013-2016) = 15.0, 27-03-2017, BookChapterSeriesAndMatConfByIndicator
Citation count*1 (2017-11-25)
Cite
Share Share



* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back