Please use this identifier to cite or link to this item:
Title: Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication
Authors: Papadamou, Kostantinos 
Zannettou, Savvas 
Chifor, Bogdan 
Teican, Sorin 
Gugulea, George 
Recupero, Annamaria 
Caponi, Alberto 
Claudio, Pisa 
Bianchi, Giuseppe 
Gevers, Steven 
Xenakis, Christos 
Sirivianos, Michael 
Major Field of Science: Engineering and Technology
Field Category: Electrical Engineering - Electronic Engineering - Information Engineering
Keywords: Computer Science;Cryptography and Security;Computer Science - Networking and Internet Architecture
Issue Date: 2020
Source: IEEE Transactions on Information Forensics and Security, 2020, vol. 15, pp. 2183 - 2193
Volume: 15
Start page: 2183
End page: 2193
Project: From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control 
Journal: IEEE Transactions on Information Forensics and Security 
Abstract: Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not allow anonymity-preserving access to services. Third, users have multiple online accounts that often reflect distinct identity aspects. This makes proving combinations of identity attributes hard on the users. In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attribute-based authentication based on: 1) the seamless integration between usable/strong device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental deployability, wide adoption and compliance with NIST assurance levels; and 3) a novel centralized component that allows end-users to perform identity profile and consent management, to prove combinations of fragmented identity aspects, and to perform account recovery in case of device loss. To the best of our knowledge, this is the first effort towards fusing the aforementioned techniques under an integrated architecture. This architecture effectively deems the password paradigm obsolete with minimal modification on the service provider's software stack.
ISSN: 1556-6013
DOI: 10.1109/TIFS.2019.2958763
Rights: © IEEE
Type: Article
Affiliation : Cyprus University of Technology 
Research & Development, CERTSIGN S.A 
University of Rome Tor Vergata 
La Defense 
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record


checked on Nov 9, 2023


Last Week
Last month
checked on Oct 29, 2023

Page view(s)

Last Week
Last month
checked on Dec 8, 2023

Google ScholarTM



Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.