A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Protecting applications with transient authentication
2003
Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03
How does a machine know who is using it? Current systems authenticate their users infrequently, and assume the user's identity does not change. Such persistent authentication is inappropriate for mobile and ubiquitous systems, where associations between people and devices are fluid and unpredictable. We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link. We present the four principles
doi:10.1145/1066116.1066117
fatcat:57tn6pfll5gztktuozzqq4ywsu