119
click to vote
ACSAC
15 years 7 months ago
2008 IEEE
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
107
click to vote
ACSAC
15 years 7 months ago
2008 IEEE
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
ACSAC
15 years 7 months ago
2008 IEEE
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
118
click to vote
ACSAC
15 years 7 months ago
2008 IEEE
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
121
click to vote
ACSAC
15 years 1 months ago
2008 IEEE
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
|