期刊文献+

面向社交网络的认证模型 被引量:6

Authentication models faced on social networks
下载PDF
导出
摘要 针对目前基于凭证的社交认证系统中社交凭证产生方式匮乏和应用场景单一以及基于知识的社交认证系统存在社交知识种类缺乏等问题,提出了应用短信、电话和数据连接等多种社交活动的基于凭证的社交认证模型及应用边特性和节点特性多种类型的基于知识的社交认证模型.结合传统认证方式提出一种多层次、多因子式的统一认证模型.结果表明,结合线上线下两种社交认证场景,该统一认证模型可以解决社交认证信息只能为特定系统使用的问题并且能为其他认证系统提供社交认证服务. In order to solve the problem that the generation modes of social credentials are less and theapplication scenarios are simplex in the credential based social authentication systems, as well as the problemthat the types of social knowledge are insufficient in the knowledge based social authentication systems, acredential based social authentication model, which adopted the multiple social activities such as shortmessages, calls and data connections, was proposed. Meanwhile, a knowledge based social authenticationmodel, which adopted the multiple edge and node attributes, was also proposed. Furthermore, a universalauthentication model with multiple layers and factors was proposed in combinatiaon with the conventionalauthentication modes. The results show that in combinatiaon with both online and offline social authenticationscenarios, the proposed model can solve the problem that the social authentication information can only beutilized for certain system, and can provide social authentication service for other authentication systems.
出处 《沈阳工业大学学报》 EI CAS 北大核心 2016年第5期545-550,共6页 Journal of Shenyang University of Technology
基金 国家自然科学基金资助项目(61502262) 青岛市科技计划基础研究项目(KJZD-13-31-JCH)
关键词 社交网络 身份认证 认证模型 社交凭证 社交知识 社交活动 统一认证模型 信息安全 social network identity authentication authentication model social credential social knowledge social activity universal authentication model information security
  • 相关文献

参考文献12

  • 1Papacharissi Z. A networked self: identity, communi- ty, and culture on social network sites [ M ]. New York : Routledge, 2011.
  • 2Brainard J, Juels A, Rivest R L, et al. Fourth-factor authentication : somebody you know [ C ]//13 th ACM Conference on Computer and Communications Securi- ty. Virginia,USA,2006 : 168 - 178.
  • 3Henk C A, van Tilborg, Jajodia S. Encyclopedia of cryptography and security [M]. New York: Springer US ,2011.
  • 4al Abdulwahid A,Clarke N, Furnell S, et al. The cur- rent use of authentication technologies: an investigative review [ C]//2015 IEEE International Conference on Cloud Computing. Riyadh, Saudi Arabia ,2015 : 1 - 8.
  • 5Javed A, Bletgen D, Kohlar F, et al. Secure fallback authentication and the trusted friend attack [ C]//2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. Madrid, Spain ,2014: 22 - 28.
  • 6Schechter S,Egelman S, Reeder R W. It' s not what you know, but who you know [ C ]//Proceedings of the 27th ACM SIGCHI Conference on Human Factors in Computing Systems. Toronto, Canada, 2009 : 172 -181.
  • 7Shao C, Chert L, Fan S, et al. Social authentication identity: an alternate to internet real name system [ C ]//International Conference on Security and Priva- cy in Communication Systems. Beijing, China, 2014: 132 - 140.
  • 8Soleymani B, Maheswaran M. Social authentication protocol for mobile phones [ C ]//2009 International Conference on Computational Science and Engineer- ing. Vancouver, Canada,2009:436 - 441.
  • 9刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 10刘飞飞,刘宴兵.基于社交网络的智能手机轻型安全认证协议设计[J].重庆邮电大学学报(自然科学版),2013,25(1):132-137. 被引量:4

二级参考文献31

  • 1宋伟,赵清杰,宋红,樊茜.基于关键块空间分布与Gabor滤波的人脸表情识别算法[J].中南大学学报(自然科学版),2013,44(S2):239-243. 被引量:7
  • 2邓洪波,金连文.一种基于局部Gabor滤波器组及PCA+LDA的人脸表情识别方法[J].中国图象图形学报,2007,12(2):322-329. 被引量:36
  • 3P. A. Tresadern,M. C. Ionita,T. F. Cootes.Real-Time Facial Feature Tracking on a Mobile Device[J]. International Journal of Computer Vision . 2012 (3)
  • 4Furnell S,Clarke N,Karatzouni S.Beyond the pin:Enhancing user authentication for mobile devices. Computer Fraud&Security . 2008
  • 5Mauro Conti,Irina Zachia-Zlatea,Bruno Crispo.Mind how you answer me:Transparently Authenticating the User of a Smartphone when Answering or Placing a Call. ASIACCS’’11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security . 2011
  • 6John Brainard,Ari Juels,Ronald L. Rivest, et al.Fourth-Factor Authentication_Somebody You Know. Proceedings of the 13th ACM conference on Computer and communications security CCS‘06 . 2006
  • 7CHOW R,JAKOBSSON M,MASUOKA R,et al.Authentication inthe clouds:a framework and its application to mobile users. Pro-ceedings of the 2010 ACM Workshop on Cloud Computing SecurityWorkshop . 2010
  • 8EGELMAN S S,REEDER R W,et al.It’’s not what you know,butwho you know:asocial approach to last-resort authentication. Pro-ceedings of the 27th Annual SIGCHI Conference on Human Factors inComputing Systems . 2009
  • 9SOLEYMANI B,MAHESWARAN M.Social authentication protocolfor mobile phones. IEEE Computational Science and EngineeringCSE’’09 International Conference . 2009
  • 10Wikipedia. http://en.wikipedia.org/wiki/Authentication . 2012

共引文献32

同被引文献57

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部