115
click to vote
ACSAC
15 years 7 months ago
2008 IEEE
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
102
Voted
ACSAC
15 years 7 months ago
2008 IEEE
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
94
Voted
ACSAC
15 years 7 months ago
2008 IEEE
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
112
click to vote
ACSAC
15 years 7 months ago
2008 IEEE
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
116
Voted
ACSAC
15 years 19 days ago
2008 IEEE
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
|