To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents ...
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
: Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate prog...