A new authentication management model oriented on user’s experience

Mariusz Sepczuk , Zbigniew Kotulski


Authenticating users connecting to online services, social networks or m-banking became an indispensable element of our everyday life. Reliable authentication is a foundation of security of Internet services but, on the other hand, also a source of users’ frustration due to possible account blocking in case of three fails. In this paper we propose a model of authentication service management which helps in keeping a balance between the authentication security level and positive users’ perception of this procedure. The proposed procedure allows a user more than three attempts of authentication by switching after two failures to a more secure authentication protocol keeping a balance between QoP and QoE measures. Finally, the procedure determines an optimal path of authentication using a decision tree algorithm.
Author Mariusz Sepczuk (FEIT / IT)
Mariusz Sepczuk,,
- The Institute of Telecommunications
, Zbigniew Kotulski (FEIT / IT)
Zbigniew Kotulski,,
- The Institute of Telecommunications
Publication size in sheets0.5
Book Ganzha Maria, Maciaszek Leszek A., Paprzycki Marcin (eds.): Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, Annals of Computer Science and Information Systems, vol. 5, 2016, IEEE, ISBN 978-83-60810-65-1, [ 978-83-60810-67-5, 978-83-60810-66-8], 1817 p., DOI:10.15439/978-83-60810-66-8
2016 fedcsis.pdf / No licence information (file archived - login or check accessibility on faculty)
Keywords in Englishauthentication, Quality of Experience, Quality of Protection
Languageen angielski
2016 Sepczuk Kotulski A new authentication management.pdf 365 KB
Score (nominal)15
ScoreMinisterial score = 15.0, 25-09-2019, BookChapterSeriesAndMatConfByIndicator
Ministerial score (2013-2016) = 15.0, 25-09-2019, BookChapterSeriesAndMatConfByIndicator
Publication indicators WoS Citations = 1
Citation count*
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?