Computer security economics based on risk analysis of multilevel authentication design for access control

被引:0
|
作者
Gaol, Ford Lumban [1 ]
机构
[1] Faculty of Computer Science, Bina Nusantara University, Jl. Kebon Jeruk No27, Jakarta, Indonesia
来源
WSEAS Transactions on Information Science and Applications | 2011年 / 8卷 / 11期
关键词
Profitability - Risk assessment - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Several password techniques for multilevel authentication mechanism in the development of secondary password are presented. These include user-selected passwords, system-generated passwords, passphrases, cognitive passwords, and associative passwords. A comparative evaluation on the users memorability and users subjective preferences for those various password mechanisms was conducted. The Return on Investment (ROI) of the access control was calculated based on the result of the users memorability and risk analysis. From the comparative evaluation and the study on the ROI of the access control, it can be concluded that cognitive passwords and associative passwords appear to be the most appropriate techniques for secondary passwords.
引用
收藏
页码:417 / 429
相关论文
共 50 条
  • [31] A Hybrid Access Control Model with Multilevel Authentication and Delegation to Protect the Distributed Resources
    Nirmalrani, V.
    Sakthivel, P.
    JOURNAL OF PURE AND APPLIED MICROBIOLOGY, 2015, 9 : 595 - 609
  • [32] DESIGN AND IMPLEMENTATION OF DOOR ACCESS CONTROL AND SECURITY SYSTEM BASED ON IOT
    Sowjanya, G.
    Nagaraju, S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 83 - 86
  • [33] Smart security system for door access based on unique authentication
    Umamaheswari, K.
    Mahitha, P.
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1474 - 1477
  • [34] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [35] Design of security state machine of access control for control object based on IEC 61850
    Duan, Bin
    Liu, Bing
    2006 POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-9, 2006, : 2168 - +
  • [36] Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes
    Zhao, Xinyang
    Zhong, Bocheng
    Cui, Zicai
    ELECTRONICS, 2023, 12 (15)
  • [37] Data Security in Cloud as a Service for Access Control Among Multilevel Users
    Abbasi, Khurrum Mustafa
    ul Haq, Irfan
    Malik, Ahmad Kamran
    Khan, Tamim Ahmed
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 168 - 173
  • [38] A novel user authentication and access control scheme for a distributed computer network
    Lee, WB
    Liao, KC
    Hsiao, YH
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 118 - 122
  • [39] PLC Access Control: A Security Analysis
    Wardak, Haroon
    Zhioua, Sami
    Almulhem, Ahmad
    2016 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2016, : 56 - 61
  • [40] Security Analysis and Design of a Uniform Identity Authentication System
    Chen, Lingmin
    Xie, Xiaoyao
    Xu, Yang
    Xia, Daoxun
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 174 - 178