The 5th Factor: Behavior Profiling Opens New Possibilities for Web Access Control
نویسنده
چکیده
INTRODUCTION The Internet continues to revolutionize E-business, not solely through direct consumer sales, but by enabling companies to share enormous amounts of information with a wider, distributed user base. New information partnerships enable creative synergies at all levels of business, signifying an exciting time of growth and change. And in this new business environment, to the nimble go the spoils. However, increased openness means increased risk. Threats to corporate data security loom perilous. The total annual cost of online security violations tops $15 billion, with nearly 60 percent of attacks coming from internal sources. Recent surveys of U.S. corporations show that 85 percent reported security breaches in the last six months, with two thirds of those leading to direct financial losses. To be successful, a company must protect its valuable information assets and ensure that P A Y O F F I D E A
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملAssessing the Internal Structure of the Ellis Information Retrieval Model in Order to Present the Persian Norm of Web Retrieval Tools
Introduction: Study evaluated the internal structure of Ellis information seeking model in the student community with the aim of presenting the Persian norm. Methods: This is a descriptive-analytical study conducted by cross-sectional survey method in the second semester of the academic year 1399-1400. Population comprise of 280 graduate students at Ahvaz Jundishapur University of Medical Scien...
متن کاملCollaborative bibliography
A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes ascribed to a work and the needs of readers, bibliographic work is largely conceptual even across technological eras and domains. Yet, the development of networked information services, made possible by WWW infrastructur...
متن کاملCollaborative Bibliography Collaborative Bibliography
A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes ascribed to a work and the needs of readers, bibliographic work is largely conceptual even across technological eras and domains. Yet, the development of networked information services, made possible by WWW infrastructur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 11 شماره
صفحات -
تاریخ انتشار 2002