DocumentCode :
3344866
Title :
Access Control Policy Based on Behavior Patterns
Author :
Zhu, XiPing ; Feng, Hao ; Chen, Hong
Author_Institution :
Dept.of Comput. & Control, Guilin Univ. of Electron. Technol., Guilin, China
fYear :
2009
fDate :
14-17 Oct. 2009
Firstpage :
557
Lastpage :
560
Abstract :
In the computer security field, there are lots of way to preventing computer systems from attacks, such as identification, DAC, MAC, audit, etc. The application of biometric identification technologies such as fingerprint and facial recognition in the field of computer security now have solved the problem of password and identification leakage. But these is no way to protect the computer system from attacks by insider, who are doing crime by taking advantage of duty and by coercion. This article propose an effective strategy which achieve a safe access control and protect computer system from attacks by outsider and insider by analysis of behavior patterns.
Keywords :
authorisation; computer crime; face recognition; fingerprint identification; access control policy; behavior pattern recognition; biometric identification technologies; computer security field; identification leakage; password leakage; Access control; Biometrics; Computer crime; Computer security; Humans; Keyboards; Mice; Pattern analysis; Protection; Sampling methods; access control; attacks from insider; behavior patterns; computer security; granularity;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Genetic and Evolutionary Computing, 2009. WGEC '09. 3rd International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-0-7695-3899-0
Type :
conf
DOI :
10.1109/WGEC.2009.123
Filename :
5402772
Link To Document :
بازگشت