Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Quantifying Assurance of Knowledge Based Authentication

Published

Author(s)

Nelson E. Hastings, Donna F. Dodson

Abstract

Understanding the principles of knowledge based authentication (KBA) and developing metrics that can be applied to KBA systems will improve information system security. This paper reviews the basics of KBA systems including some environments that KBA can support. The paper then presents three models for the use of KBA when establishing the identity of
Proceedings Title
Proceedings of the 3rd European Conference on Information Warfare and Security
Conference Location
June 28-29,

Keywords

assurance, authentication, knowledge based authentication, metrics, model, security

Citation

Hastings, N. and Dodson, D. (2004), Quantifying Assurance of Knowledge Based Authentication, Proceedings of the 3rd European Conference on Information Warfare and Security, June 28-29, (Accessed October 13, 2025)

Issues

If you have any questions about this publication or are having problems accessing it, please contact [email protected].

Created June 1, 2004, Updated February 17, 2017
Was this page helpful?