Mr Saud Nejr Alotaibi
Brief biographical email@example.com
Taxonomy of Application-Based Behaviour Authentication for Mobile Security
With the rapid growth of mobile devices for using in our daily life, nearly 7 billion by end 2014, securing the sensitive data stored upon them makes authentication of paramount importance. After point-of-entry authentication, the user can perform almost all tasks without having to re-authenticate. Transparent and continuous authentication provides a basis for convenient and secure re-authentication of the user. Whilst research to date has explored a number of possible avenues, such as the development of biometric modalities that specifically relate to transparent operation and to wider system aspects, there is still a need to understand how well these approaches stand up against targeted forgery attacks and to develop intelligence into the decision-making process through appreciating the situational awareness.Mr Saud Nejr Alotaibi
The MPhil stage will focus on developing a current state of the art understanding of transparent authentication, specifically investigating its role within mobile devices. In order to understand the nature of the information available to such a system, an investigation will be undertaken in the nature of the applications on these devices. This will lead to the development of taxonomy of application-based behaviour in terms of sensitivity level and user behavioural information.
Director of studies: Prof. Steven M Furnell
Other supervisors: Prof. Nathan L Clarke
A Novel Taxonomy for Mobile Applications Data
A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
2 Journal papers
Transparent Authentication Systems for Mobile Device Security: A Review
1 Conference papers
3 publication(s) - all categories.