Continuous Authentication Using Biometrics: Data, Models, and Metrics

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Indexed In: SCOPUS
Release Date: September, 2011|Copyright: © 2012 |Pages: 294
DOI: 10.4018/978-1-61350-129-0
ISBN13: 9781613501290|ISBN10: 1613501293|EISBN13: 9781613501306
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat.

Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cognitive Biometrics
  • Continuous and Non-Disruptive Driver Authentication
  • Continuous Authentication
  • Continuous Biometric Authentication
  • Keystroke Analysis for Intrusion Detection
  • Keystroke Dynamics
  • Neural Networks
  • Performance Metrics for Continuous Authentication
  • Wearable Motion Recording Sensors
Reviews & Statements

Researchers and students in academia, as well as security professionals in industry and government will no doubt find this book helpful in advancing the security landscape. The depth of knowledge brought in by the contributors to this endeavour ensures that this book will serve as a professional reference, and provide a comprehensive and insightful view of this emerging field. I congratulate all the authors, as well as the editors, for marking an important milestone in the development of continuous authentication.

– Terence Sim, National University of Singapore, Singapore
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Issa Traore obtained a PhD in Software Engineering in 1998 from Institute Nationale Polytechnique (INPT)-LAAS/CNRS, Toulouse, France. He has been with the faculty of the Department of Electrical and Computer Engineering of the University of Victoria since 1999. He is currently an Associate Professor and the Coordinator of the Information Security and Object Technology (ISOT) Lab (http://www.isot.ece.uvic.ca) at the University of Victoria. His research interests include biometrics technologies, computer intrusion detection, network forensics, software security, and software quality engineering. He has published over 90 technical papers in computer security and software engineering and supervised 23 Master and PhD graduate students in the last 10 years. He is currently serving as Associate Editor for the International Journal of Communication Networks and Distributed Systems (IJCNDS). Dr. Traore is also a co-founder and CEO of Plurilock Security Solutions Inc. (http://www.plurilock.com), a network security company which provides innovative authentication technologies, and is one of the pioneers in bringing continuous authentication products to the market.
Ahmed Awad E. Ahmed is a Senior Scientist at the Electrical and Computer Engineering Department, University of Victoria. He is a member of the Security and Object Technology (ISOT) Research Laboratory at the University of Victoria and the principal investigator of Biotracker, a new intrusion detection system based on biometrics (http://www.isot.ece.uvic.ca/projects/biotracker). Dr. Ahmed worked as a Software Design Engineer, Project Manager, and Quality Assurance/Security Consultant in a number of leading firms. He is currently the CTO of Plurilock Security Solutions Inc. Dr. Ahmed received his Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008. His Ph.D. dissertation introduces new trends in security monitoring through human computer interaction devices. Dr. Ahmed completed his BSc and MSc degrees at the Electrical and Computer Engineering Department, Ain Shams University, Cairo, Egypt in 1992, and 1997 respectively.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Dr. Svetlana Yanushkevich, University of Calgary, Canada
  • Dr. Isaac Woungang, Ryerson University, Canada
  • Dr. Ahmad Almulhem, King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia
  • Dr. Omar Mohamed, Helwan University, Egypt
  • Dr. Wei Lu, Keene State College, USA