scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Security in 1996"


Journal ArticleDOI
Udi Manber1
TL;DR: A simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder and newly-entered passwords will become much more secure.

119 citations


Journal ArticleDOI
TL;DR: A smart card based remote access password authentication scheme which can verify a log-in password without verification table is presented which utilizes the signature property of public key systems.

94 citations


Journal ArticleDOI
TL;DR: This paper proposes a new password authentication scheme based on a one-way function that can easily verify users' login requests over insecure channels, and the authenticated user does not necessarily have to be a known person.

76 citations


Journal ArticleDOI
TL;DR: This paper presents a methodology for the modelling of the risk analysis process within a computing facility using fuzzy logic techniques, and shows that fuzzy logic modelling techniques exhibit substantial potential in addressing limitations.

66 citations


Journal ArticleDOI
TL;DR: A security evaluation and certification scheme that can instill confidence and assurance, regarding information security status, to external business parties will solve a lot of problems for the commercial world.

62 citations


Journal ArticleDOI
TL;DR: It is demonstrated that the assumption that macro viruses have to depend on the auto macros in order to replicate successfully is false - that there are many other ways which a WordMacro virus can use to get control and replicate successfully.

46 citations


Journal ArticleDOI
TL;DR: An approach to intrusion detection which places the intrusion detection responsibility for users on the host which the user first accesses results in a load leveling for messages across the network and avoids the chokepoint which exists with centralized controllers.

36 citations


Journal ArticleDOI
TL;DR: This paper presents a collision-free secret ballot protocol based on the uniquely blind signature technique that can be used to hold large-scale general elections because it ensures independence among voters without the need for any global computation.

35 citations


Journal ArticleDOI
TL;DR: The main contribution of the method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before.

33 citations


Journal ArticleDOI
TL;DR: A model for an enterprise security architecture which describes a structured inter-relationship between the technical and procedural solutions to support the long-term needs of the business of the organization is described.

28 citations


Journal ArticleDOI
TL;DR: In this article, it is shown how huge the subject of information security actually is and an information security chain (ISC) is presented that can function as a basis when companies check their information security.

Journal ArticleDOI
Ken Lindup1
TL;DR: The SFA should have the right to require senior executives to justify their conduct and competence in the event of a management failure which is so serious that it threatens the future of the firm as a regulated entity.


Journal ArticleDOI
TL;DR: The model that will be devised on the strength of this paper will promote the consistent classification of documents and is intended for integration with commercial software products that command document processing capabilities, for example, document management systems and groupware.

Journal ArticleDOI
TL;DR: A secure voting scheme that reduces the cryptographic and communication requirements in comparison with other schemes which have been presented and can be easily implemented on any existing computer network.

Journal ArticleDOI
TL;DR: This paper overviews GOST 34.10 and discusses the three main differences between the two algorithms, including GOST's principal design criterion, which does not seem to be computational efficiency.

Journal ArticleDOI
TL;DR: In this paper, a new class of highly distributed coordinated attacks and methods used for tracking down their sources are described and described.

Journal ArticleDOI
TL;DR: The vulnerabilities in commonly used authentication schemes are discussed and an overview of the emerging technologies and some of the problems they solve - and cause!

Journal ArticleDOI
TL;DR: This article provides a practical ten minute checklist for business managers to identify and prioritise significant business related risks that result from the greatly increased use of electronic communications (E-Com) at their companies.

Journal ArticleDOI
TL;DR: Research is reported which aims to obtain information about the security level of other organizations in the Netherlands from a survey of a considerable number of companies and institutes in The Netherlands.

Journal ArticleDOI
TL;DR: Hypertext is proposed to be employed to allow pre-existing data to be readily entered in its native form, and then manipulated by the security officer, and this model has been used in a banking environment and the hypertext version has been employed in the study of a computerized university student admission system.

Journal ArticleDOI
TL;DR: The use of numerical levels to describe a degree of authentication rather than the traditional true or false is proposed, designed for organizations which operate large distributed systems.

Journal ArticleDOI
TL;DR: In this paper, cryptographic instruments are inserted into the conventional secret-voting procedure: preparing, distributing, casting, accumulating, and tabulating ballot papers, which has a better chance of gaining social acceptance due to adequate social controls.

Journal ArticleDOI
TL;DR: The changes that are taking place, why the security issues are increasing in number and magnitude are shown, and what solutions may be available are indicated.





Journal ArticleDOI
TL;DR: The protection goals to be of import to a World-Wide-Web server are discussed, some of the principles to be important to attaining such a server are outlined, and the design of a server is analyzed to be secure relative to my stated goals.