Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abhilasha Bhargav-Spantzel is active.

Publication


Featured researches published by Abhilasha Bhargav-Spantzel.


International Journal of Human-computer Studies \/ International Journal of Man-machine Studies | 2007

Improving password security and memorability to protect personal and organizational information

Kim-Phuong L. Vu; Robert W. Proctor; Abhilasha Bhargav-Spantzel; Bik-Lam (Belin) Tai; Joshua Cook; E. Eugene Schultz

Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users who attempt to access such information is through the use of username-password combinations. However, this is a weak method of authentication because users tend to generate passwords that are easy to remember but also easy to crack. Proactive password checking, for which passwords must satisfy certain criteria, is one method for improving the security of user-generated passwords. The present study evaluated the time and number of attempts needed to generate unique passwords satisfying different restrictions for multiple accounts, as well as the login time and accuracy for recalling those passwords. Imposing password restrictions alone did not necessarily lead to more secure passwords. However, the use of a technique for which the first letter of each word of a sentence was used coupled with a requirement to insert a special character and digit yielded more secure passwords that were more memorable.


digital identity management | 2006

User centricity: a taxonomy and open issues

Abhilasha Bhargav-Spantzel; Jan Camenisch; Thomas Gross; Dieter Sommer

User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity in the FIM community render its semantics unclear and hamper future research in this area. Therefore, we consider user-centricity abstractly and establish a comprehensive taxonomy encompassing user-control, architecture, and usability aspects of user-centric FIM. On the systems layer, we discuss user-centric FIM systems and classify them into two predominant variants with significant feature sets. We distinguish credential-focused systems, which advocate offline identity providers and long-term credentials at a users client, and relationship-focused systems, which rely on the relationships between users and online identity providers that create short-term credentials during transactions. Note that these two notions of credentials are quite different. The further one encompasses cryptographic credentials as defined by Lysyanskaya et al. [30], the latter one federation tokens as used in todays FIM protocols like Liberty.We raise the question where user-centric FIM systems may go--within the limitations of the user-centricity paradigm as well as beyond them. Firstly, we investigate the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes. Secondly, we explore the feasibility of reaching beyond user-centricity, that is, allowing a user of a user-centric FIM system to again give away user-control by means of an explicit act of delegation. We do neither claim a solution for universal user-centric systems nor for the extension beyond the boundaries ventures by leveraging the properties of a credential-focused FIM system.


digital identity management | 2006

Privacy preserving multi-factor authentication with biometrics

Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini; Elisa Bertino

An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several challenges, related to privacy, reliability, security of the biometric data. Inter-operability is also required among the devices used for the authentication. Moreover, very often biometric authentication in itself is not sufficient as a conclusive proof of identity and has to be complemented with multiple other proofs of identity like passwords, SSN, or other user identifiers. Multi-factor authentication mechanisms are thus required to enforce strong authentication based on the biometric and identifiers of other nature.In this paper we provide a two-phase authentication mechanism for federated identity management systems. The first phase consists of a two-factor biometric authentication based on zero knowledge proofs. We employ techniques from vector-space model to generate cryptographic biometric keys. These keys are kept secret, thus preserving the confidentiality of the biometric data, and at the same time exploit the advantages of a biometric authentication. The second authentication combines several authentication factors in conjunction with the biometric to provide a strong authentication. A key advantage of our approach is that any unanticipated combination of factors can be used. Such authentication system leverages the information of the user that are available from the federated identity management system.


international conference on information and communication security | 2007

Auth-SL: a system for the specification and enforcement of quality-based authentication policies

Anna Cinzia Squicciarini; Abhilasha Bhargav-Spantzel; Elisa Bertino; Alexei B. Czeksis

This paper develops a language and a reference architecture supporting the management and enforcement of authentication policies. Such language directly supports multi-factor authentication and the high level specification of authentication factors, in terms of conditions against the features of the various authentication mechanisms and modules. In addition the language supports a rich set of constraints; by using these constraints, one can specify for example that a subject must be authenticated by two credentials issued by different authorities. The paper presents a logical definition of the language and its corresponding XML encoding. It also reports an implementation of the proposed authentication system in the context of the FreeBSD Unix operating system (OS). Critical issues in the implementation are discussed and performance results are reported. These results show that the implementation is very efficient.


identity and trust on the internet | 2010

Biometrics-based identifiers for digital identity management

Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini; Elisa Bertino; Xiangwei Kong; Weike Zhang

We present algorithms to reliably generate biometric identifiers from a users biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. The biometric identifier generation algorithms employ image hashing functions using singular value decomposition and support vector classification techniques. Our algorithms capture generic biometric features that ensure unique and repeatable biometric identifiers. We provide an empirical evaluation of our techniques using 2569 images of 488 different individuals for three types of biometric images; namely fingerprint, iris and face. Based on the biometric type and the classification models, as a result of the empirical evaluation we can generate biometric identifiers ranging from 64 bits up to 214 bits. We provide an example use of the biometric identifiers in privacy preserving multi-factor identity verification based on zero knowledge proofs. Therefore several identity verification factors, including various traditional identity attributes, can be used in conjunction with one or more biometrics of the individual to provide strong identity verification. We also ensure security and privacy of the biometric data. More specifically, we analyze several attack scenarios. We assure privacy of the biometric using the one-way hashing property, in that no information about the original biometric image is revealed from the biometric identifier.


congress on evolutionary computation | 2008

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones

Jungha Woo; Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini; Elisa Bertino

A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privacy-preserving usage. We provide a comprehensive notion of transactions history including both on-line transaction and in-person transactions. We apply cryptographic protocols, such as secret sharing and zero knowledge proofs, in a potentially vulnerable and constrained setting. Specifically, our approach supports flexible strategies based on Shamirs secret sharing to cater to different user requirements and architectural constraints. In addition, aggregate zero knowledge proofs are used to efficiently support proofs of various receipt attributes. We have implemented the system on Nokia NFC cellular phones and report in the paper performance evaluation results.


conference on human interface | 2007

Privacy requirements in identity management solutions

Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini; Matthew R. Young; Elisa Bertino

In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government perspectives. We provide surveys related to the growing problem of identity theft and the sociological concerns of individuals with respect to the privacy of their identity data. We show the privacy concerns, especially with respect to health and biometric data, where the loss of privacy of that data may have serious consequences. Moreover, we also discuss how privacy concerns change according to the individuals disposition to provide the data. Voluntary disclosure of personal information is more acceptable to users than if information disclosure is involuntary, like in the case of surveillance. Finally, we highlight the shortcomings of current identity management systems with respect to the current privacy needs and motivate the need of hardened importance of privacy enabling functionalities in such systems.


ieee international workshop on policies for distributed systems and networks | 2006

Policy languages for digital identity management in federation systems

Elisa Bertino; Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini

The goal of service provider federations is to support a controlled method by which distributed organizations can provide services to qualified individuals and manage their identity attributes at an inter-organizational level. In order to make access control decisions the history of activities should be accounted for, therefore it is necessary to record information on interactions among the federation entities. To achieve these goals we propose a comprehensive assertion language able to support description of static and dynamic properties of the federation system. The assertions are a powerful means to describe the behavior of the entities interacting in the federation, and to define policies controlling access to services and privacy policies. We also propose a log-based approach for capturing the history of activities within the federation implemented as a set of tables stored at databases at the various organizations in the federation. We illustrate how, by using different types of queries on such tables, security properties of the federation can be verified


global communications conference | 2012

Platform capability based identity management for scalable and secure cloud service access

Abhilasha Bhargav-Spantzel; Steve W. Deutsch

In the past identity management solutions evolved to solve the challenges with username/password based systems to provide a seamless single sign-on (SSO) experience for the user. With the advent of large scale cloud services, the existing SSO solutions for authentication using only username/password need to be revisited. We propose the use of platform capabilities and integrated credentials as a criteria for doing the authentication and authorization of the respective cloud service requesters. Cloud service requesters can be any type of device including PCs, TVs, laptops, phones, tablets and so on. Based on the device type the capabilities can offer information that may be necessary and sometimes sufficient to provide access to a given service. More specifically, a user may not have to enroll to get certain types of cloud services because the platform capabilities and intrinsic certificates may be sufficient without user specific information or input. For example, if a device can provide secure geo specific information then services which are provided for devices in a certain geo can be qualified based on the provided geo information without any additional input. For services that are controlled for enrolled users, instead of establishing a username/password PKI certificates can be embedded on the device which is secured using the platform capabilities. This will allow secure yet seamless access to such cloud services. Such a model where user ID is not mandatory but definitely available per service requirements, allows for enhanced privacy without jeopardizing security. Additionally the flexibility of such a model may allow the scaled identity management policies as required for various types of cloud services.


digital identity management | 2005

Establishing and protecting digital identity in federation systems

Abhilasha Bhargav-Spantzel; Anna Cinzia Squicciarini; Elisa Bertino

Collaboration


Dive into the Abhilasha Bhargav-Spantzel's collaboration.

Researchain Logo
Decentralizing Knowledge