Computer security economics based on risk analysis of multilevel authentication design for access control

被引:0
|
作者
Gaol, Ford Lumban [1 ]
机构
[1] Faculty of Computer Science, Bina Nusantara University, Jl. Kebon Jeruk No27, Jakarta, Indonesia
来源
WSEAS Transactions on Information Science and Applications | 2011年 / 8卷 / 11期
关键词
Profitability - Risk assessment - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Several password techniques for multilevel authentication mechanism in the development of secondary password are presented. These include user-selected passwords, system-generated passwords, passphrases, cognitive passwords, and associative passwords. A comparative evaluation on the users memorability and users subjective preferences for those various password mechanisms was conducted. The Return on Investment (ROI) of the access control was calculated based on the result of the users memorability and risk analysis. From the comparative evaluation and the study on the ROI of the access control, it can be concluded that cognitive passwords and associative passwords appear to be the most appropriate techniques for secondary passwords.
引用
收藏
页码:417 / 429
相关论文
共 50 条
  • [1] A design of an access control model for multilevel-security documents
    Alhammouri, Mohammad
    Muftic, Sead
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1476 - +
  • [2] Security analysis and improvements of authentication and access control in the internet of things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    Sensors (Switzerland), 2014, 14 (08): : 14786 - 14805
  • [3] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    SENSORS, 2014, 14 (08): : 14786 - 14805
  • [4] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [5] Authentication Assurance for Risk Based Services Access Control
    Chehab, Maya I.
    Abdallah, Ali E.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (04): : 302 - 310
  • [6] Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
    Park, Hyun-A
    Hong, Jong Wook
    Park, Jae Hyun
    Zhan, Justin
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (06) : 824 - 837
  • [7] An SDN-Based Wireless Authentication and Access Control Security Solution
    Han, Yanyan
    Li, Guohao
    Feng, Binbin
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 179 - 189
  • [8] Using Criterion-Based Access Control for Multilevel Database Security
    Pan, Leon
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 518 - 522
  • [9] Design and Analysis of Network Security Access Control System
    Wang, Liang
    2019 3RD INTERNATIONAL CONFERENCE ON DATA SCIENCE AND BUSINESS ANALYTICS (ICDSBA 2019), 2019, : 426 - 429
  • [10] A Design of Home Network Security Protocol using User Authentication and Access Control Technology
    Lee, Young Gu
    Kim, Hyun Chul
    Kim, Jung Jae
    Jun, Moon Seog
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 30 - 34