Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-19 of 19
Keywords: Access control
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A Clark-Wilson and ANSI role-based access control model
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
.... This paper aims to present a model for securing the EHR based on role-based access control (RBAC), attribute-based access control (ABAC) and the Clark-Wilson model. Design/methodology/approach A systematic literature review was conducted which resulted in the collection of secondary data that was used...
Journal Articles
A grounded theory approach to security policy elicitation
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (4): 454–471.
Published: 08 October 2018
... uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed...
Journal Articles
Gesture-based animated CAPTCHA
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (3): 242–254.
Published: 11 July 2016
... be contacted at: ashumilov@it-claim.ru 19 12 2014 12 07 2015 13 07 2015 © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Innovation Computer security Access control Client-server computing That kind of an editor...
Journal Articles
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (4): 421–434.
Published: 12 October 2015
... be contacted at: martin.butler@usb.ac.za © Emerald Group Publishing Limited 2015 User authentication Online banking Security Access control Differentiated authentication Risk profiling Yan et al. (2004 , p. 25) determined that users rarely choose passwords that are both hard...
Journal Articles
Security evaluation of the OAuth 2.0 framework
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (1): 73–101.
Published: 09 March 2015
... to this attack, although they have now mitigated the issue via CSRF tokens and the use of the “state” parameter. Kevin Curran can be contacted at: kj.curran@ulster.ac.uk © Emerald Group Publishing Limited 2015 Security Access control Integration between applications has become a commodity...
Journal Articles
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (2): 155–166.
Published: 03 June 2014
... touch-gesture-related features shown as below: NTM; NST; NMT; ATTM; ATST; and ATMT. Computer security Access control Mobile phones Cost-based measurement Touch dynamics User authentication Machine learning...
Journal Articles
Information flow analysis on role‐based access control model
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2002) 10 (5): 225–236.
Published: 01 December 2002
...Chang N. Zhang; Cungang Yang Information flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role‐based access control model (ORBAC) and illustrate that the confinement problem may occur on the ORBAC based system...
Journal Articles
A framework for access control in workflow systems
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2001) 9 (3): 126–133.
Published: 01 August 2001
...Reinhardt A. Botha; Jan H.P. Eloff Workflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted in the scope of a BPR project. A framework for access control in workflow systems...
Journal Articles
A secure password storage policy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (2): 79–80.
Published: 01 May 1997
...Charles Cresson Wood Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many organizations allow practices which compromise the security of their data. Highlights a policy on the proper storage of passwords and other security...
Journal Articles
Providing security for Unix networks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (2): 18–26.
Published: 01 May 1996
... to password‐cracking programs run by hackers, while external access via the Internet can be securely controlled by the TurnStyle Firewall System and the TurnStyle Internet Module. © MCB UP Limited 1996 Access control Data security Internet Security products Unix Security should...
Journal Articles
Mobile secure telephones
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (2): 7–10.
Published: 01 May 1996
.... The designs of an operator’s GSM system must take into account the environment and have secure procedures such as: the generation and distribution of keys; exchange of information between operators; the confidentiality of the algorithms. © MCB UP Limited 1996 Access control Data...
Journal Articles
Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (2): 5–6.
Published: 01 May 1996
... 1996 Access control Architecture Flexible working Local area networks Overhead costs Quality of working life A changing economic climate, combined with considerable advances in business and information technology, are having a profound effect on the way organizations conduct...
Journal Articles
Information security in business environments
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (1): 32–37.
Published: 01 March 1996
... markets and technologies. Discusses security policy, privacy, security logs, encryption, virus attacks, Internet concerns, firewalls and auditing. Outlines the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA. © MCB UP Limited 1996 Access...
Journal Articles
Security and data integrity for LANs and WANs
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (4): 27–33.
Published: 01 October 1995
... provided in the mainframe era has not been provided in the distributed environment. What must be considered now are the following issues:logical access controls access all platforms; improved network and platform reliability, and the ability to recover readily from disruption and disasters. Concludes...
Journal Articles
Security environment reviews
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (4): 3–14.
Published: 01 October 1995
... and solutions which can minimize exposures and business impact. © MCB UP Limited 1995 Access control Computer hardware Information technology Location Risk The placement of computer and communications equipment within premises is partly based on physical limitations, partly...
Journal Articles
Real security for local area networks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (1): 28–29.
Published: 01 March 1995
...John Campbell Describes a fifth‐operation software tool which is a powerful network manager that guards systems from intrusion and provides an accurate system asset register. © MCB UP Limited 1995 Access control Applications software Data security Local area networks Office...
Journal Articles
Safeguarding databases: basic concepts revisited
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (1): 30–37.
Published: 01 March 1995
...‐in is assumed; lock‐out of account when log‐in limit is exceeded; how long VMS will remember a log‐in failure,and other parameters dealing with dial‐up line access[ 6 ]. Access control Computer fraud Data security Espionage Information systems Laws Personnel policy Viruses Employees...
Journal Articles
The Open Security Architecture
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (3): 4–11.
Published: 01 March 1993
... to a network,can be included and easily administered under this architecture. © MCB UP Limited 1993 Access control Computer architectures Computer downsizing Data security 4 INFORMATION MANAGEMENT & COMPUTER SECURITY 1,3 A discussion of a "workstation-centric" architecture designed to provide...
Journal Articles
Security Officers′ Attitudes to the Use of Shared Logons
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (1): 19–21.
Published: 01 January 1993
... of security officers in a large Australian organization examined the security awareness of these officers and the reasons for, and current management practices of, shared logons. It was found that work flow efficiency was more important than access control and that policies for user group access control...
