[go: up one dir, main page]

Mihajlov et al., 2011 - Google Patents

Quantifying usability and security in authentication

Mihajlov et al., 2011

View PDF
Document ID
13690735569313090919
Author
Mihajlov M
Blazic B
Josimovski S
Publication year
Publication venue
2011 IEEE 35th Annual Computer Software and Applications Conference

External Links

Snippet

Substantial research has been conducted in developing sophisticated security methods with authentication mechanisms placed in the front line of defense. Since these mechanisms are based on user conduct, they may not accomplish the intended objectives with improper use …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass

Similar Documents

Publication Publication Date Title
Stoycheff et al. Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects
Mihajlov et al. Quantifying usability and security in authentication
Penney Internet surveillance, regulation, and chilling effects online: A comparative case study
Seigfried-Spellar et al. Computer criminal behavior is related to psychopathy and other antisocial behavior
Chenoweth et al. Application of protection motivation theory to adoption of protective technologies
Quigley et al. ‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection
Griffin et al. Inmate misconduct and the institutional capacity for control
Plümper et al. The friend of my enemy is my enemy: International alliances and international terrorism
Okutan et al. Predicting cyber attacks with bayesian networks using unconventional signals
Yang et al. Predicting user susceptibility to phishing based on multidimensional features
Bhatia et al. Privacy risk in cybersecurity data sharing
Emery et al. Do family order and neighbor intervention against intimate partner violence protect children from abuse? Findings from Kathmandu
Albladi et al. Vulnerability to social engineering in social networks: a proposed user-centric framework
Taylor et al. A tutorial in assessing disclosure risk in microdata
Faizi et al. Effect of fear on behavioral intention to comply
Voyiatzis et al. An empirical study on the web password strength in Greece
Halabi et al. Threatened, hence justified: Jewish Israelis’ use of competitive victimhood to justify violence against Palestinians
Wu et al. An approach for the protection of users’ book browsing preference privacy in a digital library
De Cristofaro Synthetic data: Methods, use cases, and risks
Kravets Comparative analysis of the cybersecurity indices and their applications
Searle Counterproductive work behaviors
Bradley Design seismic demands from seismic response analyses: a probability-based approach
Ngoc et al. New approach to quantification of privacy on social network sites
Taylor Data collection, counterterrorism and the right to privacy
Pervaiz et al. Analyses of Cybercrime Regulations Falling behind New Technologies