Mihajlov et al., 2011 - Google Patents
Quantifying usability and security in authenticationMihajlov et al., 2011
View PDF- Document ID
- 13690735569313090919
- Author
- Mihajlov M
- Blazic B
- Josimovski S
- Publication year
- Publication venue
- 2011 IEEE 35th Annual Computer Software and Applications Conference
External Links
Snippet
Substantial research has been conducted in developing sophisticated security methods with authentication mechanisms placed in the front line of defense. Since these mechanisms are based on user conduct, they may not accomplish the intended objectives with improper use …
- 238000011002 quantification 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stoycheff et al. | Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects | |
Mihajlov et al. | Quantifying usability and security in authentication | |
Penney | Internet surveillance, regulation, and chilling effects online: A comparative case study | |
Seigfried-Spellar et al. | Computer criminal behavior is related to psychopathy and other antisocial behavior | |
Chenoweth et al. | Application of protection motivation theory to adoption of protective technologies | |
Quigley et al. | ‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection | |
Griffin et al. | Inmate misconduct and the institutional capacity for control | |
Plümper et al. | The friend of my enemy is my enemy: International alliances and international terrorism | |
Okutan et al. | Predicting cyber attacks with bayesian networks using unconventional signals | |
Yang et al. | Predicting user susceptibility to phishing based on multidimensional features | |
Bhatia et al. | Privacy risk in cybersecurity data sharing | |
Emery et al. | Do family order and neighbor intervention against intimate partner violence protect children from abuse? Findings from Kathmandu | |
Albladi et al. | Vulnerability to social engineering in social networks: a proposed user-centric framework | |
Taylor et al. | A tutorial in assessing disclosure risk in microdata | |
Faizi et al. | Effect of fear on behavioral intention to comply | |
Voyiatzis et al. | An empirical study on the web password strength in Greece | |
Halabi et al. | Threatened, hence justified: Jewish Israelis’ use of competitive victimhood to justify violence against Palestinians | |
Wu et al. | An approach for the protection of users’ book browsing preference privacy in a digital library | |
De Cristofaro | Synthetic data: Methods, use cases, and risks | |
Kravets | Comparative analysis of the cybersecurity indices and their applications | |
Searle | Counterproductive work behaviors | |
Bradley | Design seismic demands from seismic response analyses: a probability-based approach | |
Ngoc et al. | New approach to quantification of privacy on social network sites | |
Taylor | Data collection, counterterrorism and the right to privacy | |
Pervaiz et al. | Analyses of Cybercrime Regulations Falling behind New Technologies |