The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Towards User Authentication Requirements for Mobile Computing
Abstract
The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device. This chapter explores user authentication requirements for mobile computing by: evaluating alternative user authentication requirements in order to make recommendations on their usage in authentication; identifying authentication methods used in mobile healthcare applications; and proposing a set of requirements for user authentication to handle the situation when a user seeks to be securely authenticated across a set of applications that are placed into context within a framework.
Related Content
N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest.
© 2024.
19 pages.
|
Praveen Kakada, Muhammed Shafi M. K..
© 2024.
14 pages.
|
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan.
© 2024.
15 pages.
|
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest.
© 2024.
15 pages.
|
S. Sivabala, P. Vidyasri.
© 2024.
23 pages.
|
H. Hajra, G. Jayalakshmi.
© 2024.
22 pages.
|
Anusha Thakur.
© 2024.
15 pages.
|
|
|