About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
CDC 2016
Conference paper
Dynamic control of complex authentication systems
Abstract
Consider a centralized system where requests for authentication arrive from different users. The system has multiple authentication methods available and a controller must decide how to assign a method to each request. We analyze the system dynamics using queueing models and propose a stochastic dynamic control methodology to assigning authentication methods to incoming tasks. We consider three different performance measures: usability, operating cost, and security. We model the trade-offs between these performance measures using a cost-based approach and a constraints-based approach, and derive structural and computational results on the optimal control strategies. We also provide a numerical example to illustrate the trade-offs between the three performance metrics, and show how to use our models to build an efficient frontier.