Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
In the case of remote work, once a user completes account authentication, they can continue to access confidential data without further verification of user identity.Thus, if a user’s device or authentication information is leaked/stolen by an adversary or shared with a third party, the confidentiality of the data is violated.Previous studie