dc.creatorLugani, Carlos Fabián
dc.date2017-10
dc.date2017-10
dc.date2017-12-05T17:21:17Z
dc.date.accessioned2019-11-21T14:24:00Z
dc.date.available2019-11-21T14:24:00Z
dc.identifierhttp://sedici.unlp.edu.ar/handle/10915/63939
dc.identifierisbn:978-950-34-1539-9
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/3040666
dc.descriptionAuthentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.
dc.descriptionVI Workshop de Seguridad Informática (WSI).
dc.descriptionRed de Universidades con Carreras en Informática (RedUNCI)
dc.formatapplication/pdf
dc.format1309-1316
dc.languageen
dc.relationXXIII Congreso Argentino de Ciencias de la Computación (La Plata, 2017).
dc.rightshttp://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.subjectCiencias Informáticas
dc.titleTwo-Way Continual Authentication Model
dc.typeObjeto de conferencia
dc.typeObjeto de conferencia


Este ítem pertenece a la siguiente institución