Continuous Authentication for Secure Mobile Applications

Document Type


Publication Date

April 2010

Faculty Sponsor

Dr. Liljana Babinkostova


Mobile devices like smart mobile phones, tablet computers, and netbooks have a key differentiation in usage pattern over traditional computing environments. These platforms are usually "outside of the firewall" and continuously exposed to "hostile" network environments. Therefore, we enter an era of computing that must assume nothing about traditional distributed computing interactions. To address this, I have been researching a cryptographic based mechanism for continuous authentication and data handling. This allows for a number of alternative approaches to traditional security mechanisms. This presentation will focus on describing continuous authentications challenges, applications, and possibilities. We will examine how to use traditional and non-traditional cryptographic techniques to address life outside the perimeter, and look at how we can actually leverage the continuously interactive aspects of modern mobile applications to enhance security.

This document is currently not available here.