Unified authentication factors and fuzzy service access using interaction provenance.
Ragib HasanRasib KhanPublished in: Comput. Secur. (2017)
Keyphrases
- fuzzy sets
- network access
- service providers
- human computer interaction
- service oriented
- access control
- user interaction
- metadata
- open distributed systems
- security services
- web services
- fuzzy logic
- wireless networks
- smart spaces
- membership functions
- fuzzy numbers
- factors that influence
- access points
- management system
- user authentication
- internet services
- databases
- password authentication
- fine grained
- strategic decisions
- biometric authentication
- user requests
- personalized services
- internet access
- steady state
- factors affecting
- information services
- fuzzy rules