检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Cheng Wang Hao Tang Hangyu Zhu Junhan Zheng Changjun Jiang
机构地区:[1]Department of Computer Science and Technology,Tongji University,Shanghai 201804,China [2]Key Laboratory of Embedded System and Service Computing,Ministry of Education,Shanghai 201804,China [3]Shanghai Artificial Intelligence Laboratory,Shanghai 200232,China
出 处:《Security and Safety》2024年第3期50-85,共36页一体化安全(英文)
基 金:supported in part by the National Natural Science Foundation of China (NSFC) under Grant 62372328;in part by the National Key Research and Development Program of China under Grant 2022YFB4501704;in part by the Program of Shanghai Academic Research Leader under Grant 22XD1423700;in part by the Shanghai Science and Technology Innovation Action Plan Project under Grant 22511100700;in part by the Leadership Project under the Oriental Talent Program;in part by the Open Fund of Key Laboratory of Industrial Internet of Things and Networked Control,Ministry of Education,under Grant 2021FF08
摘 要:The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not. Specifically, a so-called appropriate behavior involves the right agent performing the right actions at the right time under certain conditions. Then, according to different levels of appropriateness and degrees of custodies, behavioral authentication can be graded into three levels, i.e., the authentication of behavioral Identity, Conformity, and Benignity. In a broad sense, for the security and safety issue, behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem due to the ubiquity of behavior generation and the necessity of behavior regulation in any system. By this classification, this review provides a comprehensive examination of the background and preliminaries of behavioral authentication. It further summarizes existing research based on their respective focus areas and characteristics. The challenges confronted by current behavioral authentication methods are analyzed, and potential research directions are discussed to promote the diversified and integrated development of behavioral authentication.
关 键 词:behavioral authentication security and safety behavior modeling anomaly detection machine learning artificial intelligence
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249