Skip to main content

Minòs: Extended user authentication

  • Section 10 Implementations
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

  • 222 Accesses

Abstract

Minòs is a preprocessor for commands issued to the UNIX operating system. It uses information about how a user is working to continually authenticate them. Minòs learns with the user as they develop new habits with the computer. This paper describes in detail the plans for Minòs, and their realisation to date.

Michael Newberry is supported in part by the Australian Telecommunications and Electronics Research Board

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. G. Carbonell, R. S. Michalski, and T. M. Mitchell, An overview of machine learning, in Machine Learning: An Artificial Intelligence Approach, R. S. Michalski, J. G. Carbonell, and T. M. Mitchell, eds., Springer-Verlag, 1983, p. 3.

    Google Scholar 

  2. A. Dante, Inferno, in The Divine Comedy, vol. 1, Penguin Books, 1984. Translated by Mark Musa.

    Google Scholar 

  3. D. E. Denning, An intrusion-detection model, in Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986.

    Google Scholar 

  4. L. Hallme and J. V. Horne, Rep. tr-86007, tech. rep., Sytek, Inc., 1986. Original unseen — cited in [11].

    Google Scholar 

  5. J. Long, I. Nimmo-Smith, and A. Whitefield, Skilled typing: A characterization based on the distribution of times between responses, in Cognitive Aspects of Skilled typewriting, W. E. Cooper, ed., Springer-Verlag, New York, 1983.

    Google Scholar 

  6. T. F. Lunt and R. Jagannathan, A prototype real-time intrusion detection system, in Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988, p. 59.

    Google Scholar 

  7. W. Mendenhall, R. L. Scheaffer, and D. D. Wackerly, Mathematical Statistics with Applications, PWS Publishers, Boston, 1986.

    Google Scholar 

  8. M. Newberry and J. Seberry, User unique identification, in Proceedings of the Twelfth Australian Computer Science Conference, P. Nickolas, ed., University of Wollongong, February 1989, Department of Computer Science, p. 163.

    Google Scholar 

  9. J. O'Neill, Plausible reasoning, The Australian Computer Journal, 19 (1987), p. 2.

    Google Scholar 

  10. H. Sakoe and S. Chiba, Dynamic programming algorithm optimization for spoken word recognition, IEEE Transactions on Acoustics, Speech and Signal Processing, 26 (1978), p. 43.

    Google Scholar 

  11. R. C. Summers and S. A. Kurzban, Potential applications of knowledge-based methods to computer security, Computers and Security, 7 (1988), p. 373.

    Google Scholar 

  12. W. T. Tener, Discovery: an expert system in the commercial data security environment, in Proc. IFIP/Sec '86, 1986. Original unseen — cited in [11].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Newberry, M. (1990). Minòs: Extended user authentication. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030380

Download citation

  • DOI: https://doi.org/10.1007/BFb0030380

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics