ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 02 情報科学
  2. 01 学術雑誌論文

Web-Biometrics for User Authenticity Verification in Zero Trust Access Control

http://hdl.handle.net/10061/0002001020
http://hdl.handle.net/10061/0002001020
68abcfc1-efae-45ed-b7c6-d71e64ef53e3
アイテムタイプ 学術雑誌論文 / Journal Article(1)
公開日 2025-06-25
タイトル
タイトル Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
言語
言語 eng
キーワード
主題Scheme Other
主題 Zero trust access control
キーワード
主題Scheme Other
主題 zero trust network
キーワード
主題Scheme Other
主題 web-biometrics
キーワード
主題Scheme Other
主題 user authenticity
資源タイプ
資源タイプ journal article
アクセス権
アクセス権 open access
著者 笹田, 大翔

× 笹田, 大翔

ja 笹田, 大翔

ja-Kana ササダ, タイショウ

en Sasada, Taisho

Search repository
妙中, 雄三

× 妙中, 雄三

ja 妙中, 雄三

ja-Kana タエナカ, ユウゾウ

en Taenaka, Yuzo

Search repository
門林, 雄基

× 門林, 雄基

ja 門林, 雄基

ja-Kana カドバヤシ, ユウキ

en Kadobayashi, Youki

Search repository
Fall, Doudou

× Fall, Doudou

en Fall, Doudou

Search repository
抄録
内容記述タイプ Abstract
内容記述 In the case of remote work, once a user completes account authentication, they can continue to access confidential data without further verification of user identity. Thus, if a user’s device or authentication information is leaked/stolen by an adversary or shared with a third party, the confidentiality of the data is violated. Previous studies have proposed classical biometrics-based verification of user authenticity. This method could identify whether a user was an adversary or not, but could not verify whether the account operator was a legitimate user. Moreover, since the architecture of ZTAC was not designed for the use of biometrics, it could not effectively control the various access patterns of adversaries in remote work. In this study, we propose a user authenticity verification method based on biometrics, designed for use in ZTAC. By designing and monitoring web biometrics that can verify that the account operator is a legitimate user, we aim to realize a system that provides appropriate access control for accounts after authentication according to the verification results of behavioral/cognitive patterns on the browser. Achieving dynamic access control independent of authentication results enables secure management of confidential data in remote work. In the evaluation experiment, we classified the access patterns of adversaries in remote work and confirmed that the system can appropriately control each of them. Additionally, measuring the response time to access requests showed that the evaluation experiment resulted in delays of no more than approximately 130 milliseconds, confirming that the migration to the proposed method has a very low impact on the system load.
書誌情報 en : IEEE Access

巻 12, p. 129611-129622, 発行日 2024-06-12
出版者
出版者 IEEE
ISSN
収録物識別子タイプ EISSN
収録物識別子 2169-3536
出版者版DOI
関連タイプ isReplacedBy
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ACCESS.2024.3413696
出版者版URI
関連タイプ isReplacedBy
識別子タイプ URI
関連識別子 https://ieeexplore.ieee.org/abstract/document/10555260
権利
権利情報Resource https://creativecommons.org/licenses/by-nc-nd/4.0/
権利情報 $00A92024 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
著者版フラグ
出版タイプ NA
助成情報
助成機関名 Information-Technology Promotion Agency (IPA)
研究課題名 ICS-CoE Core Human Resources Development Program
戻る
0
views
See details
Views

Versions

Ver.1 2025-06-25 05:21:15.104228
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3