Labuschagne et al., 1997 - Google Patents
Improved system-access control using complementary technologiesLabuschagne et al., 1997
- Document ID
- 7299116890465684509
- Author
- Labuschagne L
- Eloff J
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
Although there are many different aspects to consider when looking at IT security, one of the most tried and trusted methods of ensuring the safety of systems and data is to control people's access to them. In this article the various complementary system-access control …
- 230000000295 complement 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brainard et al. | Fourth-factor authentication: somebody you know | |
US7137008B1 (en) | Flexible method of user authentication | |
US7191466B1 (en) | Flexible system and method of user authentication for password based system | |
US7395436B1 (en) | Methods, software programs, and systems for electronic information security | |
US20070180263A1 (en) | Identification and remote network access using biometric recognition | |
US9246887B1 (en) | Method and apparatus for securing confidential data for a user in a computer | |
US20100250937A1 (en) | Method And System For Securely Caching Authentication Elements | |
EP0986209A2 (en) | Remote authentication system | |
Abhishek et al. | A comprehensive study on multifactor authentication schemes | |
JP2002163152A (en) | Safe computer resource access system using fingerprint and method therefor | |
JP2003030149A (en) | Method and device for controlling access to resource according to authenticating method | |
Grimes | Hacking multifactor authentication | |
JP2002539514A (en) | Computer device and operation method thereof | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
US11941262B1 (en) | Systems and methods for digital data management including creation of storage location with storage access ID | |
Campbell | Putting the Passe into passwords: how passwordless technologies are reshaping digital identity | |
Nath et al. | Issues and challenges in two factor authentication algorithms | |
Gulsezim et al. | Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication | |
US11991281B1 (en) | Systems and methods for digital data management including creation of storage location with storage access id | |
EP1468347B1 (en) | Flexible method of user authentication for password based system | |
US20070289011A1 (en) | Method for Secure Operation a Computing Device | |
Labuschagne et al. | Improved system-access control using complementary technologies | |
Hasan et al. | Interaction provenance model for unified authentication factors in service oriented computing | |
Sandhu et al. | Identification and authentication | |
CN109284615A (en) | Mobile device digital resource method for managing security |