Author : Ashwini Yele 1
Date of Publication :7th March 2016
Abstract: For each user account, the legitimate password is stored with several honey words in order to sense impersonation. If honey words are selected properly, an adversary who steals a file of hashed passwords cannot be sure if it is the real password or a honey word for any account. Moreover, entering with a honey word to login will trigger an alarm notifying the administrator about a password file breach. At the expense of increasing storage requirement by 20 times, a simple and effective solution to detection of password file disclosure events. In this study, we advance the honey word system by introducing a concept of decoy files. Also, we suggest an alternative approach that selects honey words from existing user passwords in the system to provide realistic honey words – a perfectly flat honey word generation method.
Reference :
-
- Ritvars Bregzis,Calvin Gotlieb,Carole Moore , “The Beginning of Automation in the University of Toronto Library,1963–1972”, in IEEE Annals of the History of Computing, April–June 2002..
- Prof. Godswill Obioma , Prof. Ismail Junaidu , Dr. Grace Ajagun , ―The Automation of Educational Assessment in Nigeria: Challenged and Implications for Pre-Service Teacher Educaion‖,Annual Conference of the International Association for Educational Assessment (IAEA) held at the Dan Panorama Hotel, Tel-Aviv, Isreal October 20th – 25th, 2013
- M. Jou,J.K. Shiau and H.W. Zhang,‖Application of Web Technologies in Automationon Technology Education‖, International Journal of Computers and Applications, Vol. 31, No. 4, 2009
- Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, Jigang Liu,‖ APOGEE – Automated Project Grading and Instant Feedback System for Web Based Computing‖, Computer Science and Information Technology, 2nd IEEE International Conference 2009.
- Gerald Weber,‖ Defining the Paperless Workplace with the Paper Metaphor -Not a Contradiction in Terms‖,Conference: Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 120
- Ryan AusankaCrues,‖ Methods for Access Control:Advances and Limitations”,Ryan Ausanka-Crues Harvey Mudd College 301 Platt Blvd Claremont, California ,2001
- Ravi S. Sandhu{, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youman,” Role-Based Access Control Models”, IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47.
- Hamid Hatim, Hanan El Bakkali, Ilham Berrada,‖ Workflow Access Control: From Role Engineering to Task Engineering‖Internation Journal Internet Technology and Secured Transactions Vol 4, no.1, 2012
- Noorr Azah Samsudin,Shamsul Kamal Ahmad Khalid et.al. ,”Procedure Automation with Immediate User Notification : A Case Study”, IEEE Symposium on Buisness, Engineering and Industrial Applicatins, Malaysia, 2011.
- Andrew Rebeiro-Hargrave1, Hiroshi Nakajima, ―Investigation into Blood Pressure Variability in Japan and Bangladesh by ICT based Healthcare Systems”, 2014 IEEE International Conference on Systems, Man, and Cybernetics October 5-8, 2014
- Reinhardt A. Botha, Jan H.P. Eloff,‖ Designing Role Hierarchies for Access Control in Workflow Systems‖, 0- 7695-1372-7101 $10.00 0 2001