Loading

A New Multi- Authentication Scheme using Attribute Aggregation
Faris M. Al-Athari1, Abdulameer K. Hussain2
1Dr. Faris M. Al-Athari,  Professor in the College of Science and Information Technology of Zerqa University, Jordan.
2Dr. Abdulameer K. Husain,  he has Completed Master Degree in Computer Science, University of Sadam, Iraq.
Manuscript received on January 05, 2015. | Revised Manuscript received on January 27, 2015. | Manuscript published on February 28, 2015. PP: 52-55  | Volume-4 Issue-3, February 2015. | Retrieval Number:  C3722024315/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper presents an authentication method for ensuring the best user’s identity proof. The authentication procedure depends on identifying different user’s attributes since no single person or system knows anyone’s complete set of identity attributes. Individuals are most likely to know the majority of the attributes that serve to identify them. In this scheme, different attributes are defined to serve two purposes. First, to authenticate each user depending on weights assigned to each attribute of the authenticated users and these are subjected to different statistical measurements. Second, depending on the result of this statistical measurement, the system grants users different privileges using access control mechanism and thus we construct a multi-level authentication. Finally, the system applies a combination of different attributes which differs from other traditional attribute authentication.
Keywords: Attribute-based systems, Authentication, Privilege, Identity Providers.