Unified authentication factors and fuzzy service access using interaction provenance

Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-...

Full description

Saved in:
Bibliographic Details
Published in:Computers & security Vol. 67; pp. 211 - 231
Main Authors: Hasan, Ragib, Khan, Rasib
Format: Journal Article
Language:English
Published: Amsterdam Elsevier Ltd 01.06.2017
Elsevier Sequoia S.A
Subjects:
ISSN:0167-4048, 1872-6208
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management. Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, cross-platform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models.
AbstractList Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management. Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, cross-platform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models.
Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management. Our work in this paper is characterized by notions of real-life social authentication based on the nature, quality, and length of previous encounters. We delineate the fundamental similarity of authentication factors using previous interactions. We introduce the concept of interaction provenance as a unified representation model for all existing authentication factors. We present a standardized representation model for secure interaction provenance based on the W3C Provenance Working Group (PROV) model. We illustrate the practical feasibility of creating interaction provenance graphs for various interactive events in service oriented computing. The paper also presents formal security propositions toward defining secure interaction provenance schemes. We demonstrate how interaction provenance can utilize the causal relationship of past events to leverage service composition, crossplatform integration, and timeline authentication. We posit that our generic interaction provenance model also allows easier adoption of newer authentication and access control schemes. Hence, we apply fuzzy control logic for interaction provenance records to create a novel authentication and threshold based access control model. The paper presents an interaction provenance recording and authentication protocol and a proof-of-concept implementation. We demonstrate the suitability of fuzzy rules to create innovative and flexible security frameworks using linguistic policies and visualization of contour maps. We also performed extensive experiments and comparative evaluation of various provenance preservation schemes to justify the applicability for different service models.
Author Khan, Rasib
Hasan, Ragib
Author_xml – sequence: 1
  givenname: Ragib
  orcidid: 0000-0001-5248-8341
  surname: Hasan
  fullname: Hasan, Ragib
  organization: Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, AL, USA
– sequence: 2
  givenname: Rasib
  orcidid: 0000-0002-0870-6433
  surname: Khan
  fullname: Khan, Rasib
  email: khanr2@nku.edu
  organization: Department of Computer Science, Northern Kentucky University, Newport, KY, USA
BookMark eNp9kD1PwzAQQC1UJNrCH2CyxJxgO8F2JBZU8SVVYimz5TgXcFXsYjuV2l-PQ5kYOt3y3p3uzdDEeQcIXVNSUkL57bo0PkLJCBUlYSWh9RmaUilYwRmREzTNkChqUssLNItxTTLIpZyi1buzvYUO6yF9gkvW6GS9w702yYeItetwPxwOexwh7KwBrI2BGPEQrfvA1iUIGR2VbfA7cNoZuETnvd5EuPqbc7R6elwtXorl2_Pr4mFZmIrJVLSSt6wnveQd71rSVFXT1AbqltO24lUrQFNgmgARpmOC3wle9YxWjEmARlRzdHNcmy9_DxCTWvshuHxR0YbUQtSCsEzJI2WCjzFAr4xNv0-moO1GUaLGhGqtxoRqTKgIUzlhVtk_dRvslw7709L9UYL8-c5CUNFYyFU6G8Ak1Xl7Sv8BLIKNxw
CitedBy_id crossref_primary_10_1145_3460207
crossref_primary_10_1109_TSC_2019_2921586
Cites_doi 10.1016/j.comcom.2009.11.009
10.1109/2.53
10.1007/s00778-007-0044-3
10.1109/64.642960
10.1145/362686.362692
10.1145/1330311.1330323
10.3233/JCS-2008-16102
10.1145/1084805.1084812
10.1016/j.cose.2004.06.013
10.1016/j.future.2010.07.005
10.1257/jep.23.3.3
ContentType Journal Article
Copyright 2017 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Jun 2017
Copyright_xml – notice: 2017 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Jun 2017
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2017.02.014
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
ProQuest Criminal Justice (Alumni)
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 231
ExternalDocumentID 10_1016_j_cose_2017_02_014
S0167404817300408
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c328t-b86b2f0f86d6db0933994ce4b61b363b7ea1e2a0e07cd2765763f213228ee973
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000401213200013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-4048
IngestDate Thu Nov 20 01:05:47 EST 2025
Tue Nov 18 22:06:16 EST 2025
Sat Nov 29 07:22:32 EST 2025
Fri Feb 23 02:33:36 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Access control
W3C PROV
Persona
Authentication
Interaction provenance
Fuzzy
Security
Service oriented computing
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c328t-b86b2f0f86d6db0933994ce4b61b363b7ea1e2a0e07cd2765763f213228ee973
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-0870-6433
0000-0001-5248-8341
PQID 1904774702
PQPubID 46289
PageCount 21
ParticipantIDs proquest_journals_1904774702
crossref_citationtrail_10_1016_j_cose_2017_02_014
crossref_primary_10_1016_j_cose_2017_02_014
elsevier_sciencedirect_doi_10_1016_j_cose_2017_02_014
PublicationCentury 2000
PublicationDate June 2017
2017-06-00
20170601
PublicationDateYYYYMMDD 2017-06-01
PublicationDate_xml – month: 06
  year: 2017
  text: June 2017
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2017
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Groth, Moreau (bib0130) 2013
Zawoad, Dutta, Hasan (bib0320) 2015
Khan, Haque, Hasan (bib0200) 2013
Moore, Clayton, Anderson (bib0230) 2009; 23
Wang, Yuan, Archer (bib0310) 2006; 4
Tuyls, Goseling (bib0300) 2004
Covington, Sastry (bib0095) 2006
Bloom (bib0050) 1970; 13
Lebo, Sahoo, McGuinness, Belhajjame, Cheney, Corsar (bib0215) 2013
Richardson, Ruby (bib0280) 2008
Cheney (bib0085) 2011
Abadi, Fournet (bib0010) 2003
Ren, Wu (bib0275) 2010; 33
Chong (bib0090) 2009
Srinivas S., Balfanz D., Tiffany E. FIDO Universal 2nd Factor (U2F) Overview, Version v1. 0-rd-20140209, FIDO Alliance; 2014.
El Maliki, Seigneur (bib0110) 2007
Brainard, Juels, Rivest, Szydlo, Yung (bib0060) 2006
Barkie, Fletcher, Malone, Wyskida (bib0030) 2013
Juels, Wattenberg (bib0190) 1999
Merkle (bib0225) 1980
Allen (bib0015) 2015
House of Lords Science and Technology Committee (bib0170) 2007
Khan, Hasan (bib0195) 2015
Hasan, Sion, Winslett (bib0155) 2009
Krukow, Nielsen, Sassone (bib0210) 2008; 16
Nguyen, Park, Sandhu (bib0255) 2014
Benaloh, Mare (bib0040) 1994
Rada-Vilela (bib0270) 2014
Bishop (bib0045) 2002
Hasan, Sion, Winslett (bib0160) 2009; 5
Nguyen, Park, Sandhu (bib0250) 2012
Barić, Pfitzmann (bib0025) 1997
Bonneau, Herley, van Oorschot, Stajano (bib0055) 2012
Groth, Miles, Munroe (bib0140) 2006
Groth, Luck, Moreau (bib0135) 2005; vol. 3544
bib0325
Jin, Teoh, Ong, Tee (bib0185) 2008
bib0330
Hasan, Khan, Zawoad, Haque (bib0165) 2015
De Ru, Eloff (bib0100) 1997; 12
Moreau, Groth, Miles, Vazquez-Salceda, Ibbotson, Jiang (bib0235) 2008; 51
Moreau, Clifford, Freire, Futrelle, Gil, Groth (bib0240) 2011; 27
Hasan, Khan (bib0145) 2014
Edjlali, Acharya, Chaudhary (bib0105) 1998
Bureau of Justice Statistics (bib0070) 2013
Camenisch, Lysyanskaya (bib0075) 2002; vol. 2442
Florencio, Herley (bib0115) 2007
Wang, Wang, Li, Ren, Lou (bib0305) 2009
Papazoglou, van den Heuvel (bib0265) 2007; 16
Novák, Perfilieva, Močkoř (bib0260) 1999
Moreau, Missier, Belhajjame, B'Far, Cheney, Coppens (bib0245) 2013
Lopez, Oppliger, Pernul (bib0220) 2004; 23
Camenisch, Stadler (bib0080) 1997
Braun, Shinnar, Seltzer (bib0065) 2008
Information Technology and Operations Center (bib0180) 2011
Tan, Groth, Miles, Jiang, Munroe, Tsasakou (bib0295) 2006
Zadeh (bib0315) 1988; 21
Simmhan, Plale, Gannon (bib0285) 2005; 34
Batie, Levy (bib0035) 2014
Granneman (bib0120) 2004
Hasan, Sion, Winslett (bib0150) 2009
Khan, Zawoad, Haque, Hasan (bib0205) 2014
Ateniese, Camenisch, Joye, Tsudik (bib0020) 2000
Huynh, Groth, Zednik (bib0175) 2013
Groth, Moreau (bib0125) 2009; 20
Hasan (10.1016/j.cose.2017.02.014_bib0160) 2009; 5
Allen (10.1016/j.cose.2017.02.014_bib0015) 2015
Merkle (10.1016/j.cose.2017.02.014_bib0225) 1980
Zawoad (10.1016/j.cose.2017.02.014_bib0320) 2015
Abadi (10.1016/j.cose.2017.02.014_bib0010) 2003
Tuyls (10.1016/j.cose.2017.02.014_bib0300) 2004
Groth (10.1016/j.cose.2017.02.014_bib0130)
Papazoglou (10.1016/j.cose.2017.02.014_bib0265) 2007; 16
Simmhan (10.1016/j.cose.2017.02.014_bib0285) 2005; 34
Huynh (10.1016/j.cose.2017.02.014_bib0175)
Rada-Vilela (10.1016/j.cose.2017.02.014_bib0270)
Lopez (10.1016/j.cose.2017.02.014_bib0220) 2004; 23
Bloom (10.1016/j.cose.2017.02.014_bib0050) 1970; 13
Nguyen (10.1016/j.cose.2017.02.014_bib0255) 2014
Camenisch (10.1016/j.cose.2017.02.014_bib0075) 2002; vol. 2442
Novák (10.1016/j.cose.2017.02.014_bib0260) 1999
Benaloh (10.1016/j.cose.2017.02.014_bib0040) 1994
Bonneau (10.1016/j.cose.2017.02.014_bib0055) 2012
Batie (10.1016/j.cose.2017.02.014_bib0035) 2014
Hasan (10.1016/j.cose.2017.02.014_bib0150) 2009
Juels (10.1016/j.cose.2017.02.014_bib0190) 1999
10.1016/j.cose.2017.02.014_bib0290
Barkie (10.1016/j.cose.2017.02.014_bib0030) 2013
Groth (10.1016/j.cose.2017.02.014_bib0135) 2005; vol. 3544
Cheney (10.1016/j.cose.2017.02.014_bib0085) 2011
Hasan (10.1016/j.cose.2017.02.014_bib0145) 2014
Moore (10.1016/j.cose.2017.02.014_bib0230) 2009; 23
Khan (10.1016/j.cose.2017.02.014_bib0200) 2013
Moreau (10.1016/j.cose.2017.02.014_bib0245)
Groth (10.1016/j.cose.2017.02.014_bib0140) 2006
Hasan (10.1016/j.cose.2017.02.014_bib0165) 2015
Camenisch (10.1016/j.cose.2017.02.014_bib0080) 1997
Brainard (10.1016/j.cose.2017.02.014_bib0060) 2006
Wang (10.1016/j.cose.2017.02.014_bib0305) 2009
Barić (10.1016/j.cose.2017.02.014_bib0025) 1997
De Ru (10.1016/j.cose.2017.02.014_bib0100) 1997; 12
Krukow (10.1016/j.cose.2017.02.014_bib0210) 2008; 16
Bureau of Justice Statistics (10.1016/j.cose.2017.02.014_bib0070)
Tan (10.1016/j.cose.2017.02.014_bib0295) 2006
Ateniese (10.1016/j.cose.2017.02.014_bib0020) 2000
Moreau (10.1016/j.cose.2017.02.014_bib0240) 2011; 27
Edjlali (10.1016/j.cose.2017.02.014_bib0105) 1998
Florencio (10.1016/j.cose.2017.02.014_bib0115) 2007
Nguyen (10.1016/j.cose.2017.02.014_bib0250) 2012
Wang (10.1016/j.cose.2017.02.014_bib0310) 2006; 4
Covington (10.1016/j.cose.2017.02.014_bib0095) 2006
Chong (10.1016/j.cose.2017.02.014_bib0090) 2009
Hasan (10.1016/j.cose.2017.02.014_bib0155) 2009
Lebo (10.1016/j.cose.2017.02.014_bib0215)
Jin (10.1016/j.cose.2017.02.014_bib0185) 2008
Braun (10.1016/j.cose.2017.02.014_bib0065) 2008
Zadeh (10.1016/j.cose.2017.02.014_bib0315) 1988; 21
Ren (10.1016/j.cose.2017.02.014_bib0275) 2010; 33
Information Technology and Operations Center (10.1016/j.cose.2017.02.014_bib0180)
Groth (10.1016/j.cose.2017.02.014_bib0125) 2009; 20
Richardson (10.1016/j.cose.2017.02.014_bib0280) 2008
El Maliki (10.1016/j.cose.2017.02.014_bib0110) 2007
Moreau (10.1016/j.cose.2017.02.014_bib0235) 2008; 51
Granneman (10.1016/j.cose.2017.02.014_bib0120)
Khan (10.1016/j.cose.2017.02.014_bib0205) 2014
Bishop (10.1016/j.cose.2017.02.014_bib0045) 2002
Khan (10.1016/j.cose.2017.02.014_bib0195) 2015
House of Lords Science and Technology Committee (10.1016/j.cose.2017.02.014_bib0170) 2007
References_xml – year: 2004
  ident: bib0120
  article-title: Phishing for savvy users, Security Focus
– year: 2013
  ident: bib0200
  article-title: A secure location proof generation scheme for supply chain integrity preservation
– volume: 12
  start-page: 38
  year: 1997
  end-page: 45
  ident: bib0100
  article-title: Enhanced password authentication through fuzzy logic
  publication-title: IEEE Expert
– year: 2004
  ident: bib0300
  article-title: Capacity and examples of template-protecting biometric authentication systems
  publication-title: Biometric authentication
– year: 2008
  ident: bib0065
  article-title: Securing provenance
– year: 1999
  ident: bib0260
  article-title: Mathematical principles of fuzzy logic
– volume: 13
  start-page: 422
  year: 1970
  end-page: 426
  ident: bib0050
  article-title: Space/time trade-offs in hash coding with allowable errors
  publication-title: Commun ACM
– year: 2007
  ident: bib0115
  article-title: A large-scale study of web password habits
– year: 2007
  ident: bib0170
  article-title: 5th report of session 2006 07: Personal internet security
– year: 2013
  ident: bib0130
  article-title: W3C PROV – overview
– volume: 16
  start-page: 63
  year: 2008
  end-page: 101
  ident: bib0210
  article-title: A logical framework for history-based access control and reputation systems
  publication-title: J Comput Secur
– year: 2013
  ident: bib0030
  article-title: Enhancing directory service authentication and authorization using contextual information
– volume: 4
  start-page: 30
  year: 2006
  end-page: 38
  ident: bib0310
  article-title: A contextual framework for combating identity theft
  publication-title: IEEE S&P
– volume: 20
  start-page: 1246
  year: 2009
  end-page: 1259
  ident: bib0125
  article-title: Recording process documentation for provenance
  publication-title: IEEE TPDS
– ident: bib0330
  article-title: Open Provenance Model Wiki
– year: 2013
  ident: bib0175
  article-title: W3C PROV implementation report
– year: 2002
  ident: bib0045
  article-title: The art and science of computer security
– year: 2009
  ident: bib0090
  article-title: Towards semantics for provenance security
– year: 2014
  ident: bib0205
  article-title: OTIT: Towards secure provenance modeling for location proofs
– year: 2013
  ident: bib0070
  article-title: Identity Theft Supplement (ITS) to the National Crime Victimization Survey
– year: 1994
  ident: bib0040
  article-title: One-way accumulators: A decentralized alternative to digital signatures
– year: 2006
  ident: bib0095
  article-title: A contextual attribute-based access control model
– start-page: 1
  year: 2015
  ident: bib0320
  article-title: Towards building forensics enabled cloud through secure logging-as-a-service
  publication-title: IEEE TDSC
– year: 2007
  ident: bib0110
  article-title: A survey of user-centric identity management technologies
– year: 2012
  ident: bib0250
  article-title: Dependency path patterns as the foundation of access control in provenance-aware systems
– volume: 34
  start-page: 31
  year: 2005
  end-page: 36
  ident: bib0285
  article-title: A survey of data provenance in e-science
  publication-title: SIGMOD Rec
– year: 1980
  ident: bib0225
  article-title: Protocols for public key cryptosystems
– volume: 33
  start-page: 420
  year: 2010
  end-page: 431
  ident: bib0275
  article-title: Survey on anonymous communications in computer networks
  publication-title: Comput Commun
– year: 2015
  ident: bib0015
  article-title: Risk based authentication
– year: 2009
  ident: bib0155
  article-title: SPROV 2.0: A highly-configurable platform-independent library for secure provenance
– year: 2013
  ident: bib0215
  article-title: W3C PROV-O: The PROV ontology
– year: 2012
  ident: bib0055
  article-title: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
– volume: vol. 3544
  start-page: 124
  year: 2005
  end-page: 139
  ident: bib0135
  article-title: A protocol for recording provenance in service-oriented grids
  publication-title: Principles of distributed systems
– volume: 23
  start-page: 578
  year: 2004
  end-page: 590
  ident: bib0220
  article-title: Authentication and authorization infrastructures (aais): a comparative survey
  publication-title: Comput Secur
– year: 2008
  ident: bib0280
  article-title: RESTful web services
– volume: 21
  start-page: 83
  year: 1988
  end-page: 93
  ident: bib0315
  article-title: Fuzzy logic
  publication-title: Computer
– year: 2006
  ident: bib0060
  article-title: Fourth-factor authentication: somebody you know
– start-page: 410
  year: 1997
  end-page: 424
  ident: bib0080
  article-title: Efficient group signature schemes for large groups
  publication-title: Advances in cryptology
– volume: 27
  start-page: 743
  year: 2011
  end-page: 756
  ident: bib0240
  article-title: The open provenance model core specification (v1. 1)
  publication-title: Future Gen Comput Syst
– year: 2014
  ident: bib0270
  article-title: fuzzylite: A fuzzy logic control library
– year: 1997
  ident: bib0025
  article-title: Collision-free accumulators and fail-stop signature schemes without trees
– year: 2006
  ident: bib0295
  article-title: Security issues in a SOA-based provenance system
– year: 1999
  ident: bib0190
  article-title: A fuzzy commitment scheme
– year: 2009
  ident: bib0305
  article-title: Enabling public verifiability and data dynamics for storage security in cloud computing
– volume: 16
  start-page: 389
  year: 2007
  end-page: 415
  ident: bib0265
  article-title: Service oriented architectures: approaches, technologies and research issues
  publication-title: VLDB J
– year: 2013
  ident: bib0245
  article-title: W3C PROV-DM: The prov data model
– year: 2011
  ident: bib0180
  article-title: Log server aggregate log
– volume: 51
  start-page: 52
  year: 2008
  end-page: 58
  ident: bib0235
  article-title: The provenance of electronic data
  publication-title: Commun ACM
– year: 2014
  ident: bib0035
  article-title: Biometric authentication
– reference: Srinivas S., Balfanz D., Tiffany E. FIDO Universal 2nd Factor (U2F) Overview, Version v1. 0-rd-20140209, FIDO Alliance; 2014.
– volume: 23
  start-page: 3
  year: 2009
  end-page: 20
  ident: bib0230
  article-title: The economics of online crime
  publication-title: J Econ Perspect
– start-page: 255
  year: 2000
  end-page: 270
  ident: bib0020
  article-title: A practical and provably secure coalition-resistant group signature scheme
  publication-title: Advances in cryptology
– year: 2011
  ident: bib0085
  article-title: A formal framework for provenance security
– year: 2009
  ident: bib0150
  article-title: The case of the fake Picasso: Preventing history forgery with secure provenance
– volume: vol. 2442
  start-page: 61
  year: 2002
  end-page: 76
  ident: bib0075
  article-title: Dynamic accumulators and application to efficient revocation of anonymous credentials
  publication-title: Advances in cryptology
– start-page: 1
  year: 2015
  ident: bib0165
  article-title: WORAL: A witness oriented secure location provenance framework for mobile devices
  publication-title: IEEE TETC
– year: 1998
  ident: bib0105
  article-title: History-based access control for mobile code
– year: 2015
  ident: bib0195
  article-title: Fuzzy authentication using interaction provenance in service oriented computing
– year: 2006
  ident: bib0140
  article-title: Principles of high quality documentation for provenance: A philosophical discussion
– volume: 5
  start-page: 12:1
  year: 2009
  end-page: 43
  ident: bib0160
  article-title: Preventing history forgery with secure provenance
  publication-title: ACM TOS
– year: 2003
  ident: bib0010
  article-title: Access control based on execution history
– year: 2014
  ident: bib0255
  article-title: Adopting provenance-based access control in openstack cloud iaas
– ident: bib0325
  article-title: The OPM Provenance Model
– year: 2014
  ident: bib0145
  article-title: Interaction provenance model for unified authentication factors in service oriented computing
– year: 2008
  ident: bib0185
  article-title: Typing dynamics biometric authentication through fuzzy logic
– start-page: 1
  issue: 99
  year: 2015
  ident: 10.1016/j.cose.2017.02.014_bib0165
  article-title: WORAL: A witness oriented secure location provenance framework for mobile devices
  publication-title: IEEE TETC
– ident: 10.1016/j.cose.2017.02.014_bib0215
– volume: 33
  start-page: 420
  issue: 4
  year: 2010
  ident: 10.1016/j.cose.2017.02.014_bib0275
  article-title: Survey on anonymous communications in computer networks
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2009.11.009
– volume: 21
  start-page: 83
  issue: 4
  year: 1988
  ident: 10.1016/j.cose.2017.02.014_bib0315
  article-title: Fuzzy logic
  publication-title: Computer
  doi: 10.1109/2.53
– year: 2008
  ident: 10.1016/j.cose.2017.02.014_bib0280
– year: 2006
  ident: 10.1016/j.cose.2017.02.014_bib0295
– year: 1999
  ident: 10.1016/j.cose.2017.02.014_bib0260
– ident: 10.1016/j.cose.2017.02.014_bib0120
– year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0155
– year: 2006
  ident: 10.1016/j.cose.2017.02.014_bib0095
– ident: 10.1016/j.cose.2017.02.014_bib0180
– year: 2013
  ident: 10.1016/j.cose.2017.02.014_bib0200
– year: 1994
  ident: 10.1016/j.cose.2017.02.014_bib0040
– start-page: 410
  year: 1997
  ident: 10.1016/j.cose.2017.02.014_bib0080
  article-title: Efficient group signature schemes for large groups
– volume: 20
  start-page: 1246
  issue: 9
  year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0125
  article-title: Recording process documentation for provenance
  publication-title: IEEE TPDS
– volume: 5
  start-page: 12:1
  issue: 4
  year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0160
  article-title: Preventing history forgery with secure provenance
  publication-title: ACM TOS
– ident: 10.1016/j.cose.2017.02.014_bib0290
– volume: 16
  start-page: 389
  issue: 3
  year: 2007
  ident: 10.1016/j.cose.2017.02.014_bib0265
  article-title: Service oriented architectures: approaches, technologies and research issues
  publication-title: VLDB J
  doi: 10.1007/s00778-007-0044-3
– volume: vol. 2442
  start-page: 61
  year: 2002
  ident: 10.1016/j.cose.2017.02.014_bib0075
  article-title: Dynamic accumulators and application to efficient revocation of anonymous credentials
– start-page: 255
  year: 2000
  ident: 10.1016/j.cose.2017.02.014_bib0020
  article-title: A practical and provably secure coalition-resistant group signature scheme
– year: 1997
  ident: 10.1016/j.cose.2017.02.014_bib0025
– year: 2008
  ident: 10.1016/j.cose.2017.02.014_bib0185
– year: 2006
  ident: 10.1016/j.cose.2017.02.014_bib0060
– year: 2014
  ident: 10.1016/j.cose.2017.02.014_bib0145
– year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0305
– year: 2007
  ident: 10.1016/j.cose.2017.02.014_bib0110
– year: 2012
  ident: 10.1016/j.cose.2017.02.014_bib0055
– volume: 12
  start-page: 38
  issue: 6
  year: 1997
  ident: 10.1016/j.cose.2017.02.014_bib0100
  article-title: Enhanced password authentication through fuzzy logic
  publication-title: IEEE Expert
  doi: 10.1109/64.642960
– volume: 13
  start-page: 422
  issue: 7
  year: 1970
  ident: 10.1016/j.cose.2017.02.014_bib0050
  article-title: Space/time trade-offs in hash coding with allowable errors
  publication-title: Commun ACM
  doi: 10.1145/362686.362692
– year: 2007
  ident: 10.1016/j.cose.2017.02.014_bib0115
– year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0150
– volume: 51
  start-page: 52
  issue: 4
  year: 2008
  ident: 10.1016/j.cose.2017.02.014_bib0235
  article-title: The provenance of electronic data
  publication-title: Commun ACM
  doi: 10.1145/1330311.1330323
– year: 2015
  ident: 10.1016/j.cose.2017.02.014_bib0195
– year: 2012
  ident: 10.1016/j.cose.2017.02.014_bib0250
– year: 2008
  ident: 10.1016/j.cose.2017.02.014_bib0065
– volume: 16
  start-page: 63
  issue: 1
  year: 2008
  ident: 10.1016/j.cose.2017.02.014_bib0210
  article-title: A logical framework for history-based access control and reputation systems
  publication-title: J Comput Secur
  doi: 10.3233/JCS-2008-16102
– year: 2015
  ident: 10.1016/j.cose.2017.02.014_bib0015
– volume: 34
  start-page: 31
  issue: 3
  year: 2005
  ident: 10.1016/j.cose.2017.02.014_bib0285
  article-title: A survey of data provenance in e-science
  publication-title: SIGMOD Rec
  doi: 10.1145/1084805.1084812
– year: 1999
  ident: 10.1016/j.cose.2017.02.014_bib0190
– volume: 23
  start-page: 578
  issue: 7
  year: 2004
  ident: 10.1016/j.cose.2017.02.014_bib0220
  article-title: Authentication and authorization infrastructures (aais): a comparative survey
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2004.06.013
– year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0090
– year: 2003
  ident: 10.1016/j.cose.2017.02.014_bib0010
– year: 2004
  ident: 10.1016/j.cose.2017.02.014_bib0300
  article-title: Capacity and examples of template-protecting biometric authentication systems
– ident: 10.1016/j.cose.2017.02.014_bib0270
– volume: 4
  start-page: 30
  issue: 2
  year: 2006
  ident: 10.1016/j.cose.2017.02.014_bib0310
  article-title: A contextual framework for combating identity theft
  publication-title: IEEE S&P
– year: 1998
  ident: 10.1016/j.cose.2017.02.014_bib0105
– year: 2014
  ident: 10.1016/j.cose.2017.02.014_bib0205
– volume: 27
  start-page: 743
  issue: 6
  year: 2011
  ident: 10.1016/j.cose.2017.02.014_bib0240
  article-title: The open provenance model core specification (v1. 1)
  publication-title: Future Gen Comput Syst
  doi: 10.1016/j.future.2010.07.005
– year: 2014
  ident: 10.1016/j.cose.2017.02.014_bib0035
– volume: 23
  start-page: 3
  issue: 3
  year: 2009
  ident: 10.1016/j.cose.2017.02.014_bib0230
  article-title: The economics of online crime
  publication-title: J Econ Perspect
  doi: 10.1257/jep.23.3.3
– year: 2011
  ident: 10.1016/j.cose.2017.02.014_bib0085
– year: 2013
  ident: 10.1016/j.cose.2017.02.014_bib0030
– ident: 10.1016/j.cose.2017.02.014_bib0175
– year: 1980
  ident: 10.1016/j.cose.2017.02.014_bib0225
– start-page: 1
  issue: 99
  year: 2015
  ident: 10.1016/j.cose.2017.02.014_bib0320
  article-title: Towards building forensics enabled cloud through secure logging-as-a-service
  publication-title: IEEE TDSC
– year: 2007
  ident: 10.1016/j.cose.2017.02.014_bib0170
– year: 2014
  ident: 10.1016/j.cose.2017.02.014_bib0255
– ident: 10.1016/j.cose.2017.02.014_bib0070
– year: 2006
  ident: 10.1016/j.cose.2017.02.014_bib0140
– ident: 10.1016/j.cose.2017.02.014_bib0130
– volume: vol. 3544
  start-page: 124
  year: 2005
  ident: 10.1016/j.cose.2017.02.014_bib0135
  article-title: A protocol for recording provenance in service-oriented grids
– ident: 10.1016/j.cose.2017.02.014_bib0245
– year: 2002
  ident: 10.1016/j.cose.2017.02.014_bib0045
SSID ssj0017688
Score 2.1676342
Snippet Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 211
SubjectTerms Access
Access control
Adoption of innovations
Authentication
Authenticity
Contours
Credentials
Cybersecurity
Decentralization
Experiments
Feasibility
Frame analysis
Fuzzy
Fuzzy control
Graphs
Interaction provenance
Language policy
Mathematical models
Persona
Policies
Preservation
Provenance
Rules
Security
Service oriented computing
Specifications
Suitability
Visualization
W3C PROV
Title Unified authentication factors and fuzzy service access using interaction provenance
URI https://dx.doi.org/10.1016/j.cose.2017.02.014
https://www.proquest.com/docview/1904774702
Volume 67
WOSCitedRecordID wos000401213200013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection - Elsevier
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3fb9MwELZg44EXfiMGY_IDe4pSJU4a248VtNqmqSAtSH2zbMeBTlPWzS0a--s5x07aTVDBAy9R5DRJ5ft8uTvf3YfQB_B7dGp4Fas0YXGeERnDR5jHOoMrileZVrolm6DTKZvN-JeQP29bOgHaNOzmhi_-q6hhDITtSmf_Qdz9Q2EAzkHocASxw_GvBA9WZO3sSuly15tliMn1xDouUF6vbm9_RtariUi2nInRyvryFleS7PnDXbjBND0sun4GgQfCtqixgf9urcls2FmS3-aqV-ffu0EbBkOgIaXrhCgf_eoqYM7M1epyLqOzwWgzMOn6pye-a-bAeGXKKIkLkrBNbevJN3p1mf5WjfuIwvnA5ey79Dva9lX11aZ3e2ZPP4vJ19NTUY5n5WE2WVzFjlDMbbwfZp-8cB-iXUKHHLT27uh4PDvpN5nA02J963f466Gmyqf_3X_1n-yWe1_w1iwpn6EnwZ_AI4-D5-iBaV6gp52McFDdL1EZYIHvwgIHWGCABW5hgQMssIcFbmGBN2CB17B4hcrJuPx4FAdGDVh7hC1jxQpF6qRmheMRc8EsznNtclWkKisyRY1MDZGJSaiuCC3AGc1q4gIWzBhOs9dop7lszBuEK0WrOk8lGyYmJ5WRQ53zVCleqzzXmu-htJsuoUO3eUd6ciG6tMJz4aZYuCkWCREwxXso6u9Z-F4rW3897KQggrXorUABKNp6334nMhGWrRVgFufgCNGEvN1--R16vF4b-2hneb0y79Ej_WM5t9cHAWG_AN4qlKo
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unified+authentication+factors+and+fuzzy+service+access+using+interaction+provenance&rft.jtitle=Computers+%26+security&rft.au=Hasan%2C+Ragib&rft.au=Khan%2C+Rasib&rft.date=2017-06-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=67&rft.spage=211&rft_id=info:doi/10.1016%2Fj.cose.2017.02.014&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon