A Method of Risk Assessment for Multi-Factor Authentication

Jae-Jung Kim and Seng-Phil Hong
Volume: 7, No: 1, Page: 187 ~ 198, Year: 2011
10.3745/JIPS.2011.7.1.187
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Full Text:

Abstract
User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
J. K. S. Hong, "A Method of Risk Assessment for Multi-Factor Authentication," Journal of Information Processing Systems, vol. 7, no. 1, pp. 187~198, 2011. DOI: 10.3745/JIPS.2011.7.1.187.

ACM Style
Jae-Jung Kim and Seng-Phil Hong. 2011. A Method of Risk Assessment for Multi-Factor Authentication, Journal of Information Processing Systems, 7, 1, (2011), 187~198. DOI: 10.3745/JIPS.2011.7.1.187.