{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:50:10Z","timestamp":1726851010936},"reference-count":30,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation","award":["826284"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,10,1]]},"abstract":"Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user\u2019s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication\u2019s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication\u2019s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.<\/jats:p>","DOI":"10.1155\/2021\/8146553","type":"journal-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T23:17:38Z","timestamp":1633130258000},"page":"1-11","source":"Crossref","is-referenced-by-count":4,"title":["Access Control beyond Authentication"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4597-6539","authenticated-orcid":true,"given":"Javier","family":"Junquera-S\u00e1nchez","sequence":"first","affiliation":[{"name":"Computer Science Department, University of Alcal\u00e1, Alcal\u00e1, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7107-8655","authenticated-orcid":true,"given":"Carlos","family":"Cilleruelo","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcal\u00e1, Alcal\u00e1, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0718-8774","authenticated-orcid":true,"given":"Luis","family":"De-Marcos","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcal\u00e1, Alcal\u00e1, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2351-7163","authenticated-orcid":true,"given":"Jos\u00e9-Javier","family":"Martinez-Herr\u00e1iz","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcal\u00e1, Alcal\u00e1, Spain"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/smartcloud.2016.22"},{"key":"2","article-title":"Zero trust architecture: comment on draft NIST SP 800-207 | CSRC","author":"Information Technology Laboratory Computer Security Division","year":"2019"},{"key":"3","article-title":"Named: endpoint threat detection & response","author":"A. Chuvakin","year":"2013"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1021\/acs.analchem.8b04704"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-018-0628-2"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1093\/pubmed\/fdr015"},{"key":"7","article-title":"From Login to Logout: Continuous Authentication with Behavioral Biometrics","author":"BioCatch","year":"2019"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1080\/1364557032000119616"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1570-1"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/3203422.3203424"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.037"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/isi.2010.5484746"},{"key":"14","first-page":"187","article-title":"Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones","author":"H. Xu"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.12.003"},{"key":"16","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1007\/978-3-319-39555-5_35","article-title":"Gesture-based continuous authentication for wearable devices: the smart glasses use case","volume-title":"Applied Cryptography and Network Security, Lecture Notes in Computer Science","author":"J. Chauhan","year":"2016"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2506542"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ispacs.2015.7432808"},{"key":"19","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-38682-4_20","article-title":"Brain signal based continuous authentication: functional NIRS approach","volume-title":"Advances in Computational Intelligence","author":"M. Shozawa","year":"2013"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2904018"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2208153"},{"key":"22","first-page":"686","article-title":"Continuous authentication by keystroke dynamics using committee machines","volume-title":"Intelligence and Security Informatics, Lecture Notes in Computer Science","author":"S. R. d. L. Silva Filho","year":"2011"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/iccomm.2014.6866686"},{"key":"24","article-title":"Continuous Authentication of Smartphones Based on Application Usage","author":"U. Mahbub","year":"2018"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.001"},{"key":"26","first-page":"3789","article-title":"An HMM-based behavior modeling approach for continuous mobile authentication","author":"A. Roy"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/confluence.2018.8442703"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1109\/SPW.2018.00042","article-title":"WACA: wearable-assisted continuous authentication","author":"A. Acar","year":"2018"},{"key":"29","article-title":"Tinderbox eigenfaces models","author":"W. Commons","year":"2019"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2012.2225048"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8146553.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8146553.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8146553.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T23:17:45Z","timestamp":1633130265000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/8146553\/"}},"subtitle":[],"editor":[{"given":"Luigi","family":"Catuogno","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":30,"alternative-id":["8146553","8146553"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8146553","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}