Implicit Authentication through Learning User Behavior View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2011

AUTHORS

Elaine Shi , Yuan Niu , Markus Jakobsson , Richard Chow

ABSTRACT

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects. More... »

PAGES

99-113

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-18178-8_9

DOI

http://dx.doi.org/10.1007/978-3-642-18178-8_9

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1032633217


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Palo Alto Research Center, USA", 
          "id": "http://www.grid.ac/institutes/grid.482243.b", 
          "name": [
            "Palo Alto Research Center, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shi", 
        "givenName": "Elaine", 
        "id": "sg:person.014706274717.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Davis, USA", 
          "id": "http://www.grid.ac/institutes/grid.27860.3b", 
          "name": [
            "University of California, Davis, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Niu", 
        "givenName": "Yuan", 
        "id": "sg:person.013171566455.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013171566455.72"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FatSkunk, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "FatSkunk, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jakobsson", 
        "givenName": "Markus", 
        "id": "sg:person.010203664455.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010203664455.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Palo Alto Research Center, USA", 
          "id": "http://www.grid.ac/institutes/grid.482243.b", 
          "name": [
            "Palo Alto Research Center, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chow", 
        "givenName": "Richard", 
        "id": "sg:person.016703074555.19", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016703074555.19"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.", 
    "editor": [
      {
        "familyName": "Burmester", 
        "givenName": "Mike", 
        "type": "Person"
      }, 
      {
        "familyName": "Tsudik", 
        "givenName": "Gene", 
        "type": "Person"
      }, 
      {
        "familyName": "Magliveras", 
        "givenName": "Spyros", 
        "type": "Person"
      }, 
      {
        "familyName": "Ili\u0107", 
        "givenName": "Ivana", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-18178-8_9", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-18177-1", 
        "978-3-642-18178-8"
      ], 
      "name": "Information Security", 
      "type": "Book"
    }, 
    "keywords": [
      "implicit authentication", 
      "current authentication methods", 
      "authentication method", 
      "mobile devices", 
      "short password", 
      "password entry", 
      "user behavior", 
      "authentication", 
      "users", 
      "password", 
      "behavior patterns", 
      "devices", 
      "technique", 
      "method", 
      "model", 
      "data", 
      "entry", 
      "patterns", 
      "behavior", 
      "pin", 
      "subjects", 
      "weeks", 
      "implicit authentication - authenticating users", 
      "authentication - authenticating users", 
      "Learning User Behavior"
    ], 
    "name": "Implicit Authentication through Learning User Behavior", 
    "pagination": "99-113", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1032633217"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-18178-8_9"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-18178-8_9", 
      "https://app.dimensions.ai/details/publication/pub.1032633217"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:07", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_121.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-18178-8_9"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-18178-8_9'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-18178-8_9'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-18178-8_9'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-18178-8_9'


 

This table displays all metadata directly associated to this object as RDF triples.

127 TRIPLES      23 PREDICATES      51 URIs      44 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-18178-8_9 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Ncc7dd4ca15da400eb06e23e0c9ba9076
4 schema:datePublished 2011
5 schema:datePublishedReg 2011-01-01
6 schema:description Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.
7 schema:editor N011245f089c944f2b32811ffb03e392f
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N59d461fcd48540c38011cb901890bf17
12 schema:keywords Learning User Behavior
13 authentication
14 authentication - authenticating users
15 authentication method
16 behavior
17 behavior patterns
18 current authentication methods
19 data
20 devices
21 entry
22 implicit authentication
23 implicit authentication - authenticating users
24 method
25 mobile devices
26 model
27 password
28 password entry
29 patterns
30 pin
31 short password
32 subjects
33 technique
34 user behavior
35 users
36 weeks
37 schema:name Implicit Authentication through Learning User Behavior
38 schema:pagination 99-113
39 schema:productId N64ee8a8e405643938022cf15f1ee4b87
40 N84400a295649435d9b7f4e047abab13a
41 schema:publisher Naa69086514f2491ba33cec9c62e8117b
42 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032633217
43 https://doi.org/10.1007/978-3-642-18178-8_9
44 schema:sdDatePublished 2022-01-01T19:07
45 schema:sdLicense https://scigraph.springernature.com/explorer/license/
46 schema:sdPublisher Nd34ea289ba394a84be4d139d23ca75cd
47 schema:url https://doi.org/10.1007/978-3-642-18178-8_9
48 sgo:license sg:explorer/license/
49 sgo:sdDataset chapters
50 rdf:type schema:Chapter
51 N00c0bba6b1844613803aaf1af91dc76a rdf:first sg:person.013171566455.72
52 rdf:rest N28a2d28d309d441296d7fb568940cf64
53 N011245f089c944f2b32811ffb03e392f rdf:first N43474ef7a0344398a1d4c27982ac6bcf
54 rdf:rest N53902a315ddd43de974a5e380b12cf19
55 N28a2d28d309d441296d7fb568940cf64 rdf:first sg:person.010203664455.03
56 rdf:rest N9e1aeba036474830a41eadfd4ad3aba8
57 N28d3daa25353424d8727ea15c84dfc98 rdf:first Na05cef237cf94e1a83a6d8a4928a9bf5
58 rdf:rest rdf:nil
59 N43474ef7a0344398a1d4c27982ac6bcf schema:familyName Burmester
60 schema:givenName Mike
61 rdf:type schema:Person
62 N53902a315ddd43de974a5e380b12cf19 rdf:first N5cc5d72d907545e5a794f20e6a73d7fe
63 rdf:rest Nd456a6a2bf0149318e8e6057d7df782a
64 N57dad44a19e64717b03d82129f3994ca schema:familyName Magliveras
65 schema:givenName Spyros
66 rdf:type schema:Person
67 N59d461fcd48540c38011cb901890bf17 schema:isbn 978-3-642-18177-1
68 978-3-642-18178-8
69 schema:name Information Security
70 rdf:type schema:Book
71 N5cc5d72d907545e5a794f20e6a73d7fe schema:familyName Tsudik
72 schema:givenName Gene
73 rdf:type schema:Person
74 N64ee8a8e405643938022cf15f1ee4b87 schema:name doi
75 schema:value 10.1007/978-3-642-18178-8_9
76 rdf:type schema:PropertyValue
77 N84400a295649435d9b7f4e047abab13a schema:name dimensions_id
78 schema:value pub.1032633217
79 rdf:type schema:PropertyValue
80 N9e1aeba036474830a41eadfd4ad3aba8 rdf:first sg:person.016703074555.19
81 rdf:rest rdf:nil
82 Na05cef237cf94e1a83a6d8a4928a9bf5 schema:familyName Ilić
83 schema:givenName Ivana
84 rdf:type schema:Person
85 Naa69086514f2491ba33cec9c62e8117b schema:name Springer Nature
86 rdf:type schema:Organisation
87 Ncc7dd4ca15da400eb06e23e0c9ba9076 rdf:first sg:person.014706274717.52
88 rdf:rest N00c0bba6b1844613803aaf1af91dc76a
89 Nd34ea289ba394a84be4d139d23ca75cd schema:name Springer Nature - SN SciGraph project
90 rdf:type schema:Organization
91 Nd456a6a2bf0149318e8e6057d7df782a rdf:first N57dad44a19e64717b03d82129f3994ca
92 rdf:rest N28d3daa25353424d8727ea15c84dfc98
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
97 schema:name Artificial Intelligence and Image Processing
98 rdf:type schema:DefinedTerm
99 sg:person.010203664455.03 schema:affiliation grid-institutes:None
100 schema:familyName Jakobsson
101 schema:givenName Markus
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010203664455.03
103 rdf:type schema:Person
104 sg:person.013171566455.72 schema:affiliation grid-institutes:grid.27860.3b
105 schema:familyName Niu
106 schema:givenName Yuan
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013171566455.72
108 rdf:type schema:Person
109 sg:person.014706274717.52 schema:affiliation grid-institutes:grid.482243.b
110 schema:familyName Shi
111 schema:givenName Elaine
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014706274717.52
113 rdf:type schema:Person
114 sg:person.016703074555.19 schema:affiliation grid-institutes:grid.482243.b
115 schema:familyName Chow
116 schema:givenName Richard
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016703074555.19
118 rdf:type schema:Person
119 grid-institutes:None schema:alternateName FatSkunk, USA
120 schema:name FatSkunk, USA
121 rdf:type schema:Organization
122 grid-institutes:grid.27860.3b schema:alternateName University of California, Davis, USA
123 schema:name University of California, Davis, USA
124 rdf:type schema:Organization
125 grid-institutes:grid.482243.b schema:alternateName Palo Alto Research Center, USA
126 schema:name Palo Alto Research Center, USA
127 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...