{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:13:41Z","timestamp":1726103621036},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030625788"},{"type":"electronic","value":"9783030625795"}],"license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62579-5_14","type":"book-chapter","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T06:02:40Z","timestamp":1604296960000},"page":"194-209","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["JBCA: Designing an Adaptative Continuous Authentication Architecture"],"prefix":"10.1007","author":[{"given":"Javier","family":"Junquera-S\u00e1nchez","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Cilleruelo-Rodr\u00edguez","sequence":"additional","affiliation":[]},{"given":"Luis","family":"de-Marcos","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Javier","family":"Mart\u00ednez-Herr\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"14_CR1","unstructured":"OAuth Grant Types. https:\/\/oauth.net\/2\/grant-types\/"},{"key":"14_CR2","unstructured":"REGULATION (EU) 2016\/ 679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL - of 27 April 2016 - on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/ 46\/ EC (general data protection regulation)"},{"issue":"4","key":"14_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s13218-018-0526-z","volume":"32","author":"A Alshehri","year":"2018","unstructured":"Alshehri, A., Coenen, F., Bollegala, D.: Iterative keystroke continuous authentication: a time series based approach. KI-Kunstliche Intelligenz 32(4), 231\u2013243 (2018). https:\/\/doi.org\/10.1007\/s13218-018-0526-z","journal-title":"KI-Kunstliche Intelligenz"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10700-008-9034-1","volume":"7","author":"A Azzini","year":"2008","unstructured":"Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optim. Decis. Mak. 7(3), 243 (2008). https:\/\/doi.org\/10.1007\/s10700-008-9034-1","journal-title":"Fuzzy Optim. Decis. Mak."},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.procs.2019.08.028","volume":"155","author":"OE Basar","year":"2019","unstructured":"Basar, O.E., Alptekin, G., Volaka, H.C., Isbilen, M., Incel, O.D.: Resource usage analysis of a mobile banking application using sensor-and-touchscreen-based continuous authentication. Procedia Comput. Sci. 155, 185\u2013192 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.08.028","journal-title":"Procedia Comput. Sci."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bonastre, J.F., Bimbot, F., Boe, L.J., Campbell, J.P., Reynolds, D.A., Magrin-Chagnolleau, I.: Person authentication by voice: a need for caution, p.\u00a04 (2003)","DOI":"10.21437\/Eurospeech.2003-9"},{"key":"14_CR7","unstructured":"Bradley, J., Sakimura, N., Jones, M.: JSON web token (JWT) (2015). https:\/\/tools.ietf.org\/html\/rfc7519"},{"key":"14_CR8","unstructured":"Campbell, B., Jones, M., Mortimore, C.: JSON web token (JWT) profile for OAuth 2.0 client authentication and authorization grants (2015). https:\/\/tools.ietf.org\/html\/rfc7523"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5565\/rev\/elcvia.607","volume":"13","author":"P Casale","year":"2014","unstructured":"Casale, P.: Approximate ensemble methods for physical activity recognition applications. ELCVIA: Electron. Lett. Comput. Vis. Image Anal. 13, 22\u201323 (2014)","journal-title":"ELCVIA: Electron. Lett. Comput. Vis. Image Anal."},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Chatterjee, A., Aung, K.M.M.: Fully homomorphic encryption in real world applications. In: Computer Architecture and Design Methodologies. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6393-1","DOI":"10.1007\/978-981-13-6393-1"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) Theory and Applications of Models of Computation, Lecture Notes in Computer Science, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/2904018","volume":"19","author":"S Eberz","year":"2016","unstructured":"Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Looks like eve: exposing insider threats using eye movement biometrics. ACM Trans. Priv. Secur. (TOPS) 19(1), 1:1\u20131:31 (2016). https:\/\/doi.org\/10.1145\/2904018","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2012","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2225048","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR14","unstructured":"Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior, p.\u00a013 (2014)"},{"key":"14_CR15","unstructured":"Hardt, D.: The OAuth 2.0 authorization framework (2012). https:\/\/tools.ietf.org\/html\/rfc6749"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Katevas, K., Haddadi, H., Tokarchuk, L.: Poster: SensingKit: a multi-platform mobile sensing framework for large-scale experiments. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, MobiCom 2014, pp. 375\u2013378. Association for Computing Machinery, Maui (2014). https:\/\/doi.org\/10.1145\/2639108.2642910","DOI":"10.1145\/2639108.2642910"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Lin, F., Song, C., Zhuang, Y., Xu, W., Li, C., Ren, K.: Cardiac scan:a non-contact and continuous heart-based user authentication system. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, pp. 315\u2013328. Association for Computing Machinery, Snowbird (2017). https:\/\/doi.org\/10.1145\/3117811.3117839","DOI":"10.1145\/3117811.3117839"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Mahfouz, A., Mahmoud, T.M., Sharaf\u00a0Eldin, A.: A behavioral biometric authentication framework on smartphones. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 923\u2013925. Association for Computing Machinery, Abu Dhabi (2017). https:\/\/doi.org\/10.1145\/3052973.3055160","DOI":"10.1145\/3052973.3055160"},{"key":"14_CR19","unstructured":"Mondal, S., Bours, P.: Continuous authentication using mouse dynamics. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1\u201312 (2013)"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"7736","DOI":"10.1109\/ACCESS.2016.2626718","volume":"4","author":"A Morales","year":"2016","unstructured":"Morales, A., Fierrez, J., Tolosana, R., Ortega-Garcia, J., Galbally, J., Gomez-Barrero, M., Anjos, A., Marcel, S.: Keystroke biometrics ongoing competition. IEEE Access 4, 7736\u20137746 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2626718","journal-title":"IEEE Access"},{"key":"14_CR21","unstructured":"Parecki, A.: OAuth 2.1. IETF 106 (2019). https:\/\/www.ietf.org\/proceedings\/106\/slides\/slides-106-oauth-sessa-oauth-21-00.pdf"},{"issue":"4","key":"14_CR22","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s13173-013-0117-7","volume":"19","author":"PH Pisani","year":"2013","unstructured":"Pisani, P.H., Lorena, A.C.: A systematic review on keystroke dynamics. J. Braz. Comput. Soc. 19(4), 573\u2013587 (2013). https:\/\/doi.org\/10.1007\/s13173-013-0117-7","journal-title":"J. Braz. Comput. Soc."},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Polikar, R.: Ensemble learning. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning: Methods and Applications, pp. 1\u201334. Springer, US (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7_1","DOI":"10.1007\/978-1-4419-9326-7_1"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics, pp. 111\u2013114 (1995). https:\/\/doi.org\/10.1049\/cp:19950480","DOI":"10.1049\/cp:19950480"},{"key":"14_CR25","unstructured":"Siirtola, P., Komulainen, J., Kellokumpu, V.: Effect of context in swipe gesture-based continuous authentication on smartphones (2019)"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Solapurkar, P.: Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 99\u2013104 (2016). https:\/\/doi.org\/10.1109\/IC3I.2016.7917942","DOI":"10.1109\/IC3I.2016.7917942"},{"issue":"2","key":"14_CR27","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2012.2208153","volume":"8","author":"P Tsai","year":"2012","unstructured":"Tsai, P., Khan, M.K., Pan, J., Liao, B.: Interactive artificial bee colony supported passive continuous authentication system. IEEE Syst. J. 8(2), 395\u2013405 (2012). https:\/\/doi.org\/10.1109\/JSYST.2012.2208153","journal-title":"IEEE Syst. J."},{"key":"14_CR28","unstructured":"Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, SOUPS 2014, pp. 187\u2013198. USENIX Association, Menlo Park (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Physical Agents II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62579-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T03:49:37Z","timestamp":1669434577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62579-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"ISBN":["9783030625788","9783030625795"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62579-5_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,3]]},"assertion":[{"value":"3 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop of Physical Agents","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Alcal\u00e1 de Henares, Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waf2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.robesafe.uah.es\/waf2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}