A method in a data processing system for managing access to a resource. A
user is validated to use the resource based on data provided in an act by
the user. A set of user behavioral attributes from acts generated by the
user are identified while the user is using the resource. The set of user
behavioral attributes are compared to a set of historical user behavioral
attributes to form a comparison. Whether to accept a request from the
user to access the resource is determined based on the comparison.