[go: up one dir, main page]

Labuschagne et al., 1997 - Google Patents

Improved system-access control using complementary technologies

Labuschagne et al., 1997

Document ID
7299116890465684509
Author
Labuschagne L
Eloff J
Publication year
Publication venue
Computers & Security

External Links

Snippet

Although there are many different aspects to consider when looking at IT security, one of the most tried and trusted methods of ensuring the safety of systems and data is to control people's access to them. In this article the various complementary system-access control …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Brainard et al. Fourth-factor authentication: somebody you know
US7137008B1 (en) Flexible method of user authentication
US7191466B1 (en) Flexible system and method of user authentication for password based system
US7395436B1 (en) Methods, software programs, and systems for electronic information security
US20070180263A1 (en) Identification and remote network access using biometric recognition
US9246887B1 (en) Method and apparatus for securing confidential data for a user in a computer
US20100250937A1 (en) Method And System For Securely Caching Authentication Elements
EP0986209A2 (en) Remote authentication system
Abhishek et al. A comprehensive study on multifactor authentication schemes
JP2002163152A (en) Safe computer resource access system using fingerprint and method therefor
JP2003030149A (en) Method and device for controlling access to resource according to authenticating method
Grimes Hacking multifactor authentication
JP2002539514A (en) Computer device and operation method thereof
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
US11941262B1 (en) Systems and methods for digital data management including creation of storage location with storage access ID
Campbell Putting the Passe into passwords: how passwordless technologies are reshaping digital identity
Nath et al. Issues and challenges in two factor authentication algorithms
Gulsezim et al. Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication
US11991281B1 (en) Systems and methods for digital data management including creation of storage location with storage access id
EP1468347B1 (en) Flexible method of user authentication for password based system
US20070289011A1 (en) Method for Secure Operation a Computing Device
Labuschagne et al. Improved system-access control using complementary technologies
Hasan et al. Interaction provenance model for unified authentication factors in service oriented computing
Sandhu et al. Identification and authentication
CN109284615A (en) Mobile device digital resource method for managing security