Unified authentication factors and fuzzy service access using interaction provenance
Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-...
Uloženo v:
| Vydáno v: | Computers & security Ročník 67; s. 211 - 231 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Amsterdam
Elsevier Ltd
01.06.2017
Elsevier Sequoia S.A |
| Témata: | |
| ISSN: | 0167-4048, 1872-6208 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management.
Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, cross-platform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models. |
|---|---|
| AbstractList | Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management.
Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, cross-platform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models. Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management. Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, crossplatform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models. |
| Author | Khan, Rasib Hasan, Ragib |
| Author_xml | – sequence: 1 givenname: Ragib orcidid: 0000-0001-5248-8341 surname: Hasan fullname: Hasan, Ragib organization: Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, AL, USA – sequence: 2 givenname: Rasib orcidid: 0000-0002-0870-6433 surname: Khan fullname: Khan, Rasib email: khanr2@nku.edu organization: Department of Computer Science, Northern Kentucky University, Newport, KY, USA |
| BookMark | eNp9kD1PwzAQQC1UJNrCH2CyxJxgO8F2JBZU8SVVYimz5TgXcFXsYjuV2l-PQ5kYOt3y3p3uzdDEeQcIXVNSUkL57bo0PkLJCBUlYSWh9RmaUilYwRmREzTNkChqUssLNItxTTLIpZyi1buzvYUO6yF9gkvW6GS9w702yYeItetwPxwOexwh7KwBrI2BGPEQrfvA1iUIGR2VbfA7cNoZuETnvd5EuPqbc7R6elwtXorl2_Pr4mFZmIrJVLSSt6wnveQd71rSVFXT1AbqltO24lUrQFNgmgARpmOC3wle9YxWjEmARlRzdHNcmy9_DxCTWvshuHxR0YbUQtSCsEzJI2WCjzFAr4xNv0-moO1GUaLGhGqtxoRqTKgIUzlhVtk_dRvslw7709L9UYL8-c5CUNFYyFU6G8Ak1Xl7Sv8BLIKNxw |
| CitedBy_id | crossref_primary_10_1145_3460207 crossref_primary_10_1109_TSC_2019_2921586 |
| Cites_doi | 10.1016/j.comcom.2009.11.009 10.1109/2.53 10.1007/s00778-007-0044-3 10.1109/64.642960 10.1145/362686.362692 10.1145/1330311.1330323 10.3233/JCS-2008-16102 10.1145/1084805.1084812 10.1016/j.cose.2004.06.013 10.1016/j.future.2010.07.005 10.1257/jep.23.3.3 |
| ContentType | Journal Article |
| Copyright | 2017 Elsevier Ltd Copyright Elsevier Sequoia S.A. Jun 2017 |
| Copyright_xml | – notice: 2017 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Jun 2017 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
| DOI | 10.1016/j.cose.2017.02.014 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-6208 |
| EndPage | 231 |
| ExternalDocumentID | 10_1016_j_cose_2017_02_014 S0167404817300408 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD JQ2 K7. L7M L~C L~D |
| ID | FETCH-LOGICAL-c328t-b86b2f0f86d6db0933994ce4b61b363b7ea1e2a0e07cd2765763f213228ee973 |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000401213200013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-4048 |
| IngestDate | Thu Nov 20 01:05:47 EST 2025 Tue Nov 18 22:06:16 EST 2025 Sat Nov 29 07:22:32 EST 2025 Fri Feb 23 02:33:36 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Access control W3C PROV Persona Authentication Interaction provenance Fuzzy Security Service oriented computing |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c328t-b86b2f0f86d6db0933994ce4b61b363b7ea1e2a0e07cd2765763f213228ee973 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-0870-6433 0000-0001-5248-8341 |
| PQID | 1904774702 |
| PQPubID | 46289 |
| PageCount | 21 |
| ParticipantIDs | proquest_journals_1904774702 crossref_citationtrail_10_1016_j_cose_2017_02_014 crossref_primary_10_1016_j_cose_2017_02_014 elsevier_sciencedirect_doi_10_1016_j_cose_2017_02_014 |
| PublicationCentury | 2000 |
| PublicationDate | June 2017 2017-06-00 20170601 |
| PublicationDateYYYYMMDD | 2017-06-01 |
| PublicationDate_xml | – month: 06 year: 2017 text: June 2017 |
| PublicationDecade | 2010 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 2017 |
| Publisher | Elsevier Ltd Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
| References | Groth, Moreau (bib0130) 2013 Zawoad, Dutta, Hasan (bib0320) 2015 Khan, Haque, Hasan (bib0200) 2013 Moore, Clayton, Anderson (bib0230) 2009; 23 Wang, Yuan, Archer (bib0310) 2006; 4 Tuyls, Goseling (bib0300) 2004 Covington, Sastry (bib0095) 2006 Bloom (bib0050) 1970; 13 Lebo, Sahoo, McGuinness, Belhajjame, Cheney, Corsar (bib0215) 2013 Richardson, Ruby (bib0280) 2008 Cheney (bib0085) 2011 Abadi, Fournet (bib0010) 2003 Ren, Wu (bib0275) 2010; 33 Chong (bib0090) 2009 Srinivas S., Balfanz D., Tiffany E. FIDO Universal 2nd Factor (U2F) Overview, Version v1. 0-rd-20140209, FIDO Alliance; 2014. El Maliki, Seigneur (bib0110) 2007 Brainard, Juels, Rivest, Szydlo, Yung (bib0060) 2006 Barkie, Fletcher, Malone, Wyskida (bib0030) 2013 Juels, Wattenberg (bib0190) 1999 Merkle (bib0225) 1980 Allen (bib0015) 2015 House of Lords Science and Technology Committee (bib0170) 2007 Khan, Hasan (bib0195) 2015 Hasan, Sion, Winslett (bib0155) 2009 Krukow, Nielsen, Sassone (bib0210) 2008; 16 Nguyen, Park, Sandhu (bib0255) 2014 Benaloh, Mare (bib0040) 1994 Rada-Vilela (bib0270) 2014 Bishop (bib0045) 2002 Hasan, Sion, Winslett (bib0160) 2009; 5 Nguyen, Park, Sandhu (bib0250) 2012 Barić, Pfitzmann (bib0025) 1997 Bonneau, Herley, van Oorschot, Stajano (bib0055) 2012 Groth, Miles, Munroe (bib0140) 2006 Groth, Luck, Moreau (bib0135) 2005; vol. 3544 bib0325 Jin, Teoh, Ong, Tee (bib0185) 2008 bib0330 Hasan, Khan, Zawoad, Haque (bib0165) 2015 De Ru, Eloff (bib0100) 1997; 12 Moreau, Groth, Miles, Vazquez-Salceda, Ibbotson, Jiang (bib0235) 2008; 51 Moreau, Clifford, Freire, Futrelle, Gil, Groth (bib0240) 2011; 27 Hasan, Khan (bib0145) 2014 Edjlali, Acharya, Chaudhary (bib0105) 1998 Bureau of Justice Statistics (bib0070) 2013 Camenisch, Lysyanskaya (bib0075) 2002; vol. 2442 Florencio, Herley (bib0115) 2007 Wang, Wang, Li, Ren, Lou (bib0305) 2009 Papazoglou, van den Heuvel (bib0265) 2007; 16 Novák, Perfilieva, Močkoř (bib0260) 1999 Moreau, Missier, Belhajjame, B'Far, Cheney, Coppens (bib0245) 2013 Lopez, Oppliger, Pernul (bib0220) 2004; 23 Camenisch, Stadler (bib0080) 1997 Braun, Shinnar, Seltzer (bib0065) 2008 Information Technology and Operations Center (bib0180) 2011 Tan, Groth, Miles, Jiang, Munroe, Tsasakou (bib0295) 2006 Zadeh (bib0315) 1988; 21 Simmhan, Plale, Gannon (bib0285) 2005; 34 Batie, Levy (bib0035) 2014 Granneman (bib0120) 2004 Hasan, Sion, Winslett (bib0150) 2009 Khan, Zawoad, Haque, Hasan (bib0205) 2014 Ateniese, Camenisch, Joye, Tsudik (bib0020) 2000 Huynh, Groth, Zednik (bib0175) 2013 Groth, Moreau (bib0125) 2009; 20 Hasan (10.1016/j.cose.2017.02.014_bib0160) 2009; 5 Allen (10.1016/j.cose.2017.02.014_bib0015) 2015 Merkle (10.1016/j.cose.2017.02.014_bib0225) 1980 Zawoad (10.1016/j.cose.2017.02.014_bib0320) 2015 Abadi (10.1016/j.cose.2017.02.014_bib0010) 2003 Tuyls (10.1016/j.cose.2017.02.014_bib0300) 2004 Groth (10.1016/j.cose.2017.02.014_bib0130) Papazoglou (10.1016/j.cose.2017.02.014_bib0265) 2007; 16 Simmhan (10.1016/j.cose.2017.02.014_bib0285) 2005; 34 Huynh (10.1016/j.cose.2017.02.014_bib0175) Rada-Vilela (10.1016/j.cose.2017.02.014_bib0270) Lopez (10.1016/j.cose.2017.02.014_bib0220) 2004; 23 Bloom (10.1016/j.cose.2017.02.014_bib0050) 1970; 13 Nguyen (10.1016/j.cose.2017.02.014_bib0255) 2014 Camenisch (10.1016/j.cose.2017.02.014_bib0075) 2002; vol. 2442 Novák (10.1016/j.cose.2017.02.014_bib0260) 1999 Benaloh (10.1016/j.cose.2017.02.014_bib0040) 1994 Bonneau (10.1016/j.cose.2017.02.014_bib0055) 2012 Batie (10.1016/j.cose.2017.02.014_bib0035) 2014 Hasan (10.1016/j.cose.2017.02.014_bib0150) 2009 Juels (10.1016/j.cose.2017.02.014_bib0190) 1999 10.1016/j.cose.2017.02.014_bib0290 Barkie (10.1016/j.cose.2017.02.014_bib0030) 2013 Groth (10.1016/j.cose.2017.02.014_bib0135) 2005; vol. 3544 Cheney (10.1016/j.cose.2017.02.014_bib0085) 2011 Hasan (10.1016/j.cose.2017.02.014_bib0145) 2014 Moore (10.1016/j.cose.2017.02.014_bib0230) 2009; 23 Khan (10.1016/j.cose.2017.02.014_bib0200) 2013 Moreau (10.1016/j.cose.2017.02.014_bib0245) Groth (10.1016/j.cose.2017.02.014_bib0140) 2006 Hasan (10.1016/j.cose.2017.02.014_bib0165) 2015 Camenisch (10.1016/j.cose.2017.02.014_bib0080) 1997 Brainard (10.1016/j.cose.2017.02.014_bib0060) 2006 Wang (10.1016/j.cose.2017.02.014_bib0305) 2009 Barić (10.1016/j.cose.2017.02.014_bib0025) 1997 De Ru (10.1016/j.cose.2017.02.014_bib0100) 1997; 12 Krukow (10.1016/j.cose.2017.02.014_bib0210) 2008; 16 Bureau of Justice Statistics (10.1016/j.cose.2017.02.014_bib0070) Tan (10.1016/j.cose.2017.02.014_bib0295) 2006 Ateniese (10.1016/j.cose.2017.02.014_bib0020) 2000 Moreau (10.1016/j.cose.2017.02.014_bib0240) 2011; 27 Edjlali (10.1016/j.cose.2017.02.014_bib0105) 1998 Florencio (10.1016/j.cose.2017.02.014_bib0115) 2007 Nguyen (10.1016/j.cose.2017.02.014_bib0250) 2012 Wang (10.1016/j.cose.2017.02.014_bib0310) 2006; 4 Covington (10.1016/j.cose.2017.02.014_bib0095) 2006 Chong (10.1016/j.cose.2017.02.014_bib0090) 2009 Hasan (10.1016/j.cose.2017.02.014_bib0155) 2009 Lebo (10.1016/j.cose.2017.02.014_bib0215) Jin (10.1016/j.cose.2017.02.014_bib0185) 2008 Braun (10.1016/j.cose.2017.02.014_bib0065) 2008 Zadeh (10.1016/j.cose.2017.02.014_bib0315) 1988; 21 Ren (10.1016/j.cose.2017.02.014_bib0275) 2010; 33 Information Technology and Operations Center (10.1016/j.cose.2017.02.014_bib0180) Groth (10.1016/j.cose.2017.02.014_bib0125) 2009; 20 Richardson (10.1016/j.cose.2017.02.014_bib0280) 2008 El Maliki (10.1016/j.cose.2017.02.014_bib0110) 2007 Moreau (10.1016/j.cose.2017.02.014_bib0235) 2008; 51 Granneman (10.1016/j.cose.2017.02.014_bib0120) Khan (10.1016/j.cose.2017.02.014_bib0205) 2014 Bishop (10.1016/j.cose.2017.02.014_bib0045) 2002 Khan (10.1016/j.cose.2017.02.014_bib0195) 2015 House of Lords Science and Technology Committee (10.1016/j.cose.2017.02.014_bib0170) 2007 |
| References_xml | – year: 2004 ident: bib0120 article-title: Phishing for savvy users, Security Focus – year: 2013 ident: bib0200 article-title: A secure location proof generation scheme for supply chain integrity preservation – volume: 12 start-page: 38 year: 1997 end-page: 45 ident: bib0100 article-title: Enhanced password authentication through fuzzy logic publication-title: IEEE Expert – year: 2004 ident: bib0300 article-title: Capacity and examples of template-protecting biometric authentication systems publication-title: Biometric authentication – year: 2008 ident: bib0065 article-title: Securing provenance – year: 1999 ident: bib0260 article-title: Mathematical principles of fuzzy logic – volume: 13 start-page: 422 year: 1970 end-page: 426 ident: bib0050 article-title: Space/time trade-offs in hash coding with allowable errors publication-title: Commun ACM – year: 2007 ident: bib0115 article-title: A large-scale study of web password habits – year: 2007 ident: bib0170 article-title: 5th report of session 2006 07: Personal internet security – year: 2013 ident: bib0130 article-title: W3C PROV – overview – volume: 16 start-page: 63 year: 2008 end-page: 101 ident: bib0210 article-title: A logical framework for history-based access control and reputation systems publication-title: J Comput Secur – year: 2013 ident: bib0030 article-title: Enhancing directory service authentication and authorization using contextual information – volume: 4 start-page: 30 year: 2006 end-page: 38 ident: bib0310 article-title: A contextual framework for combating identity theft publication-title: IEEE S&P – volume: 20 start-page: 1246 year: 2009 end-page: 1259 ident: bib0125 article-title: Recording process documentation for provenance publication-title: IEEE TPDS – ident: bib0330 article-title: Open Provenance Model Wiki – year: 2013 ident: bib0175 article-title: W3C PROV implementation report – year: 2002 ident: bib0045 article-title: The art and science of computer security – year: 2009 ident: bib0090 article-title: Towards semantics for provenance security – year: 2014 ident: bib0205 article-title: OTIT: Towards secure provenance modeling for location proofs – year: 2013 ident: bib0070 article-title: Identity Theft Supplement (ITS) to the National Crime Victimization Survey – year: 1994 ident: bib0040 article-title: One-way accumulators: A decentralized alternative to digital signatures – year: 2006 ident: bib0095 article-title: A contextual attribute-based access control model – start-page: 1 year: 2015 ident: bib0320 article-title: Towards building forensics enabled cloud through secure logging-as-a-service publication-title: IEEE TDSC – year: 2007 ident: bib0110 article-title: A survey of user-centric identity management technologies – year: 2012 ident: bib0250 article-title: Dependency path patterns as the foundation of access control in provenance-aware systems – volume: 34 start-page: 31 year: 2005 end-page: 36 ident: bib0285 article-title: A survey of data provenance in e-science publication-title: SIGMOD Rec – year: 1980 ident: bib0225 article-title: Protocols for public key cryptosystems – volume: 33 start-page: 420 year: 2010 end-page: 431 ident: bib0275 article-title: Survey on anonymous communications in computer networks publication-title: Comput Commun – year: 2015 ident: bib0015 article-title: Risk based authentication – year: 2009 ident: bib0155 article-title: SPROV 2.0: A highly-configurable platform-independent library for secure provenance – year: 2013 ident: bib0215 article-title: W3C PROV-O: The PROV ontology – year: 2012 ident: bib0055 article-title: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes – volume: vol. 3544 start-page: 124 year: 2005 end-page: 139 ident: bib0135 article-title: A protocol for recording provenance in service-oriented grids publication-title: Principles of distributed systems – volume: 23 start-page: 578 year: 2004 end-page: 590 ident: bib0220 article-title: Authentication and authorization infrastructures (aais): a comparative survey publication-title: Comput Secur – year: 2008 ident: bib0280 article-title: RESTful web services – volume: 21 start-page: 83 year: 1988 end-page: 93 ident: bib0315 article-title: Fuzzy logic publication-title: Computer – year: 2006 ident: bib0060 article-title: Fourth-factor authentication: somebody you know – start-page: 410 year: 1997 end-page: 424 ident: bib0080 article-title: Efficient group signature schemes for large groups publication-title: Advances in cryptology – volume: 27 start-page: 743 year: 2011 end-page: 756 ident: bib0240 article-title: The open provenance model core specification (v1. 1) publication-title: Future Gen Comput Syst – year: 2014 ident: bib0270 article-title: fuzzylite: A fuzzy logic control library – year: 1997 ident: bib0025 article-title: Collision-free accumulators and fail-stop signature schemes without trees – year: 2006 ident: bib0295 article-title: Security issues in a SOA-based provenance system – year: 1999 ident: bib0190 article-title: A fuzzy commitment scheme – year: 2009 ident: bib0305 article-title: Enabling public verifiability and data dynamics for storage security in cloud computing – volume: 16 start-page: 389 year: 2007 end-page: 415 ident: bib0265 article-title: Service oriented architectures: approaches, technologies and research issues publication-title: VLDB J – year: 2013 ident: bib0245 article-title: W3C PROV-DM: The prov data model – year: 2011 ident: bib0180 article-title: Log server aggregate log – volume: 51 start-page: 52 year: 2008 end-page: 58 ident: bib0235 article-title: The provenance of electronic data publication-title: Commun ACM – year: 2014 ident: bib0035 article-title: Biometric authentication – reference: Srinivas S., Balfanz D., Tiffany E. FIDO Universal 2nd Factor (U2F) Overview, Version v1. 0-rd-20140209, FIDO Alliance; 2014. – volume: 23 start-page: 3 year: 2009 end-page: 20 ident: bib0230 article-title: The economics of online crime publication-title: J Econ Perspect – start-page: 255 year: 2000 end-page: 270 ident: bib0020 article-title: A practical and provably secure coalition-resistant group signature scheme publication-title: Advances in cryptology – year: 2011 ident: bib0085 article-title: A formal framework for provenance security – year: 2009 ident: bib0150 article-title: The case of the fake Picasso: Preventing history forgery with secure provenance – volume: vol. 2442 start-page: 61 year: 2002 end-page: 76 ident: bib0075 article-title: Dynamic accumulators and application to efficient revocation of anonymous credentials publication-title: Advances in cryptology – start-page: 1 year: 2015 ident: bib0165 article-title: WORAL: A witness oriented secure location provenance framework for mobile devices publication-title: IEEE TETC – year: 1998 ident: bib0105 article-title: History-based access control for mobile code – year: 2015 ident: bib0195 article-title: Fuzzy authentication using interaction provenance in service oriented computing – year: 2006 ident: bib0140 article-title: Principles of high quality documentation for provenance: A philosophical discussion – volume: 5 start-page: 12:1 year: 2009 end-page: 43 ident: bib0160 article-title: Preventing history forgery with secure provenance publication-title: ACM TOS – year: 2003 ident: bib0010 article-title: Access control based on execution history – year: 2014 ident: bib0255 article-title: Adopting provenance-based access control in openstack cloud iaas – ident: bib0325 article-title: The OPM Provenance Model – year: 2014 ident: bib0145 article-title: Interaction provenance model for unified authentication factors in service oriented computing – year: 2008 ident: bib0185 article-title: Typing dynamics biometric authentication through fuzzy logic – start-page: 1 issue: 99 year: 2015 ident: 10.1016/j.cose.2017.02.014_bib0165 article-title: WORAL: A witness oriented secure location provenance framework for mobile devices publication-title: IEEE TETC – ident: 10.1016/j.cose.2017.02.014_bib0215 – volume: 33 start-page: 420 issue: 4 year: 2010 ident: 10.1016/j.cose.2017.02.014_bib0275 article-title: Survey on anonymous communications in computer networks publication-title: Comput Commun doi: 10.1016/j.comcom.2009.11.009 – volume: 21 start-page: 83 issue: 4 year: 1988 ident: 10.1016/j.cose.2017.02.014_bib0315 article-title: Fuzzy logic publication-title: Computer doi: 10.1109/2.53 – year: 2008 ident: 10.1016/j.cose.2017.02.014_bib0280 – year: 2006 ident: 10.1016/j.cose.2017.02.014_bib0295 – year: 1999 ident: 10.1016/j.cose.2017.02.014_bib0260 – ident: 10.1016/j.cose.2017.02.014_bib0120 – year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0155 – year: 2006 ident: 10.1016/j.cose.2017.02.014_bib0095 – ident: 10.1016/j.cose.2017.02.014_bib0180 – year: 2013 ident: 10.1016/j.cose.2017.02.014_bib0200 – year: 1994 ident: 10.1016/j.cose.2017.02.014_bib0040 – start-page: 410 year: 1997 ident: 10.1016/j.cose.2017.02.014_bib0080 article-title: Efficient group signature schemes for large groups – volume: 20 start-page: 1246 issue: 9 year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0125 article-title: Recording process documentation for provenance publication-title: IEEE TPDS – volume: 5 start-page: 12:1 issue: 4 year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0160 article-title: Preventing history forgery with secure provenance publication-title: ACM TOS – ident: 10.1016/j.cose.2017.02.014_bib0290 – volume: 16 start-page: 389 issue: 3 year: 2007 ident: 10.1016/j.cose.2017.02.014_bib0265 article-title: Service oriented architectures: approaches, technologies and research issues publication-title: VLDB J doi: 10.1007/s00778-007-0044-3 – volume: vol. 2442 start-page: 61 year: 2002 ident: 10.1016/j.cose.2017.02.014_bib0075 article-title: Dynamic accumulators and application to efficient revocation of anonymous credentials – start-page: 255 year: 2000 ident: 10.1016/j.cose.2017.02.014_bib0020 article-title: A practical and provably secure coalition-resistant group signature scheme – year: 1997 ident: 10.1016/j.cose.2017.02.014_bib0025 – year: 2008 ident: 10.1016/j.cose.2017.02.014_bib0185 – year: 2006 ident: 10.1016/j.cose.2017.02.014_bib0060 – year: 2014 ident: 10.1016/j.cose.2017.02.014_bib0145 – year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0305 – year: 2007 ident: 10.1016/j.cose.2017.02.014_bib0110 – year: 2012 ident: 10.1016/j.cose.2017.02.014_bib0055 – volume: 12 start-page: 38 issue: 6 year: 1997 ident: 10.1016/j.cose.2017.02.014_bib0100 article-title: Enhanced password authentication through fuzzy logic publication-title: IEEE Expert doi: 10.1109/64.642960 – volume: 13 start-page: 422 issue: 7 year: 1970 ident: 10.1016/j.cose.2017.02.014_bib0050 article-title: Space/time trade-offs in hash coding with allowable errors publication-title: Commun ACM doi: 10.1145/362686.362692 – year: 2007 ident: 10.1016/j.cose.2017.02.014_bib0115 – year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0150 – volume: 51 start-page: 52 issue: 4 year: 2008 ident: 10.1016/j.cose.2017.02.014_bib0235 article-title: The provenance of electronic data publication-title: Commun ACM doi: 10.1145/1330311.1330323 – year: 2015 ident: 10.1016/j.cose.2017.02.014_bib0195 – year: 2012 ident: 10.1016/j.cose.2017.02.014_bib0250 – year: 2008 ident: 10.1016/j.cose.2017.02.014_bib0065 – volume: 16 start-page: 63 issue: 1 year: 2008 ident: 10.1016/j.cose.2017.02.014_bib0210 article-title: A logical framework for history-based access control and reputation systems publication-title: J Comput Secur doi: 10.3233/JCS-2008-16102 – year: 2015 ident: 10.1016/j.cose.2017.02.014_bib0015 – volume: 34 start-page: 31 issue: 3 year: 2005 ident: 10.1016/j.cose.2017.02.014_bib0285 article-title: A survey of data provenance in e-science publication-title: SIGMOD Rec doi: 10.1145/1084805.1084812 – year: 1999 ident: 10.1016/j.cose.2017.02.014_bib0190 – volume: 23 start-page: 578 issue: 7 year: 2004 ident: 10.1016/j.cose.2017.02.014_bib0220 article-title: Authentication and authorization infrastructures (aais): a comparative survey publication-title: Comput Secur doi: 10.1016/j.cose.2004.06.013 – year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0090 – year: 2003 ident: 10.1016/j.cose.2017.02.014_bib0010 – year: 2004 ident: 10.1016/j.cose.2017.02.014_bib0300 article-title: Capacity and examples of template-protecting biometric authentication systems – ident: 10.1016/j.cose.2017.02.014_bib0270 – volume: 4 start-page: 30 issue: 2 year: 2006 ident: 10.1016/j.cose.2017.02.014_bib0310 article-title: A contextual framework for combating identity theft publication-title: IEEE S&P – year: 1998 ident: 10.1016/j.cose.2017.02.014_bib0105 – year: 2014 ident: 10.1016/j.cose.2017.02.014_bib0205 – volume: 27 start-page: 743 issue: 6 year: 2011 ident: 10.1016/j.cose.2017.02.014_bib0240 article-title: The open provenance model core specification (v1. 1) publication-title: Future Gen Comput Syst doi: 10.1016/j.future.2010.07.005 – year: 2014 ident: 10.1016/j.cose.2017.02.014_bib0035 – volume: 23 start-page: 3 issue: 3 year: 2009 ident: 10.1016/j.cose.2017.02.014_bib0230 article-title: The economics of online crime publication-title: J Econ Perspect doi: 10.1257/jep.23.3.3 – year: 2011 ident: 10.1016/j.cose.2017.02.014_bib0085 – year: 2013 ident: 10.1016/j.cose.2017.02.014_bib0030 – ident: 10.1016/j.cose.2017.02.014_bib0175 – year: 1980 ident: 10.1016/j.cose.2017.02.014_bib0225 – start-page: 1 issue: 99 year: 2015 ident: 10.1016/j.cose.2017.02.014_bib0320 article-title: Towards building forensics enabled cloud through secure logging-as-a-service publication-title: IEEE TDSC – year: 2007 ident: 10.1016/j.cose.2017.02.014_bib0170 – year: 2014 ident: 10.1016/j.cose.2017.02.014_bib0255 – ident: 10.1016/j.cose.2017.02.014_bib0070 – year: 2006 ident: 10.1016/j.cose.2017.02.014_bib0140 – ident: 10.1016/j.cose.2017.02.014_bib0130 – volume: vol. 3544 start-page: 124 year: 2005 ident: 10.1016/j.cose.2017.02.014_bib0135 article-title: A protocol for recording provenance in service-oriented grids – ident: 10.1016/j.cose.2017.02.014_bib0245 – year: 2002 ident: 10.1016/j.cose.2017.02.014_bib0045 |
| SSID | ssj0017688 |
| Score | 2.1676342 |
| Snippet | Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 211 |
| SubjectTerms | Access Access control Adoption of innovations Authentication Authenticity Contours Credentials Cybersecurity Decentralization Experiments Feasibility Frame analysis Fuzzy Fuzzy control Graphs Interaction provenance Language policy Mathematical models Persona Policies Preservation Provenance Rules Security Service oriented computing Specifications Suitability Visualization W3C PROV |
| Title | Unified authentication factors and fuzzy service access using interaction provenance |
| URI | https://dx.doi.org/10.1016/j.cose.2017.02.014 https://www.proquest.com/docview/1904774702 |
| Volume | 67 |
| WOSCitedRecordID | wos000401213200013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwELVQy4ELlC9RKMgHbqugxElt51hVRYBQxWGF9mbZiQ2tUKjqXVT66xnbY2-7qBU9cLEiK7Gy-17G4_F4HiFvRavHsJ1ZMSdd1YHLXOm2b6AB51mPnRmjfsrXz-L4WC4W_RcU4_RRTkBMk7y46M_-K9TQB2CHo7N3gLsMCh1wDaBDC7BD-0_Agxfpgl-pQ-76tMSYXBHWCYFyt7q8_D3zyUzMdNRMnK18Ot4SjiQn_fAQbrBToUWuZ4A6ED6yxqP-3dqSedxZ0t9OTDHn33Onx04MNDRinRCVY4-hRHqdCmNm45m0NIr1a65MpCyZ979sdAoXnL4LCfkht07EoqnpKOn1gtgbE1VJH8yZaacqjKHCGKpmqg6C5ttM7PdgobcPPh4tPpUNJVhVyVLmHX4Dnp9KqX6bb3KTj7IxW0cXZL5DHuLagR4kzB-Te3Z6Qh5lPCia6adkjhSg1ylAkQIUKEAjBShSgCYK0EgBeoUCdE2BZ2T-_mh--KFC9YxqaJlcVkZyw1ztJA-aYSFw1ffdYDvDG9Py1girG8t0bWsxjExwWHi2joXghLS2F-1zsjX9nOwLQrWBNbt2joP32PGB99Iw5kbLY_F8W--SJv9dasDK8kHg5Ie6GahdMivPnKW6KrfevZ9RUOgZJo9PAalufW4vQ6bwE_UKXOAOFj2iZi_v9BKvyIP1Z7FHtpbnK_ua3B9-LU_8-Rsk3B8x0o_Z |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unified+authentication+factors+and+fuzzy+service+access+using+interaction+provenance&rft.jtitle=Computers+%26+security&rft.au=Hasan%2C+Ragib&rft.au=Khan%2C+Rasib&rft.date=2017-06-01&rft.issn=0167-4048&rft.volume=67&rft.spage=211&rft.epage=231&rft_id=info:doi/10.1016%2Fj.cose.2017.02.014&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2017_02_014 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |