Towards User Authentication Requirements for Mobile Computing

Towards User Authentication Requirements for Mobile Computing

Yaira K. Rivera Sánchez, Steven A. Demurjian
ISBN13: 9781799812043|ISBN10: 1799812049|EISBN13: 9781799812050
DOI: 10.4018/978-1-7998-1204-3.ch062
Cite Chapter Cite Chapter

MLA

Sánchez, Yaira K. Rivera, and Steven A. Demurjian. "Towards User Authentication Requirements for Mobile Computing." Data Analytics in Medicine: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1254-1282. https://doi.org/10.4018/978-1-7998-1204-3.ch062

APA

Sánchez, Y. K. & Demurjian, S. A. (2020). Towards User Authentication Requirements for Mobile Computing. In I. Management Association (Ed.), Data Analytics in Medicine: Concepts, Methodologies, Tools, and Applications (pp. 1254-1282). IGI Global. https://doi.org/10.4018/978-1-7998-1204-3.ch062

Chicago

Sánchez, Yaira K. Rivera, and Steven A. Demurjian. "Towards User Authentication Requirements for Mobile Computing." In Data Analytics in Medicine: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1254-1282. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1204-3.ch062

Export Reference

Mendeley
Favorite

Abstract

The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device. This chapter explores user authentication requirements for mobile computing by: evaluating alternative user authentication requirements in order to make recommendations on their usage in authentication; identifying authentication methods used in mobile healthcare applications; and proposing a set of requirements for user authentication to handle the situation when a user seeks to be securely authenticated across a set of applications that are placed into context within a framework.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.