A Bayesian Approach to Knowledge Based Authentication in Citizen Oriented Applications
AbstractAuthentication methods for informatics applications are presented. The functioning mechanism of the knowledge based authentication is analyzed. The implications of the knowledge based authentication in informatics applications are analyzed. Methods for improving the informatics applications security are defined. Future development directions for authentication methods are presented. A compared analysis of classic and knowledge based authentication methods is made. A Bayesian probability risk model is presented for KBA. The performance of the KBA model is tested against a non-KBA authentication model, the results show a clear improvement in the system strength when using KBA.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Faculty of Finance, Banking and Accountancy Bucharest,"Dimitrie Cantemir" Christian University Bucharest in its journal Knowledge Horizons - Economics.
Volume (Year): 1 (2009)
Issue (Month): 2 (June)
Knowledge; security; informatics applications; citizen orientation;
Find related papers by JEL classification:
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Ion Ivan & Mihai Doinea & Dragos Palaghita, 2008. "Aspects Concerning the Optimization of Authentication Process for Distributed Applications," Theoretical and Applied Economics, Asociatia Generala a Economistilor din Romania - AGER, vol. 6(6(523)), pages 39-56, June.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Adi Sava).
If references are entirely missing, you can add them using this form.