(2006)Modeling an intelligent continuous authentication system to protect financial information resources.pdfVIP

  • 0
  • 0
  • 约7.72万字
  • 约 19页
  • 2017-12-07 发布于浙江
  • 举报

(2006)Modeling an intelligent continuous authentication system to protect financial information resources.pdf

International Journal of Accounting Information Systems 7 (2006) 91 – 109 Modeling an intelligent continuous authentication system to protect financial information resources T.G. Calderon ⁎, Akhilesh Chandra, John J. Cheh University of Akron, School of Accountancy, Akron OH, 44325-4802, United States Received 15 May 2005; received in revised form 1 October 2005; accepted 8 October 2005 Abstract This paper examines fundamental principles of continuous authentication (CA) and proposes a four-tier CA architecture to secure financial information systems. We define CA as a process that verifies the identity of an information systems user continuously for the entire duration of an authorized session. While organizations can, in theory, strengthen the security of their financial information systems through CA, several challenges need to be addressed in designing a CA architecture. A primary challenge involves the constantly changing user profiles in globally networked business environments. Profile content may include user knowledge and characteristics, access location, job characteristics, and transaction attributes. We propose swarm intelligence, which has the capacity to handle complex profile changes, as a technology for implementing CA in a dynamic, distributed network environment where user profiles are constantly changing. The paper explores model implementation challenges and discusses opportunities for future research. © 2006 Elsevier Inc. All rights reserved. Keywords: Continous authentication; Biometrics; Authentication confidences; Process model; Intelligent agents; Swarm intelligence 1. Introduction The Internet, advances in network technology, and the globalization of markets and business processes have created a revolution in business and information systems. A simple Internet access can

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档