메뉴 건너뛰기




Volumn , Issue , 2008, Pages 47-52

Towards a user-centric identity-usage monitoring system

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT INFORMATION; CYBER SPACES; IDENTITY THEFTS; INTERNATIONAL CONFERENCES; INTERNET MONITORING; INTERNET USERS; MONITORING SYSTEMS; ONLINE IDENTITY; PROTOTYPICAL IMPLEMENTATIONS; TRUSTED THIRD PARTIES; USAGE MONITORING; USER-CENTRIC;

EID: 51849165619     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMP.2008.22     Document Type: Conference Paper
Times cited : (12)

References (29)
  • 2
    • 51849112140 scopus 로고    scopus 로고
    • at Bank, of America
    • "SiteKey at Bank, of America," http://www.bankofamerica.com/ privacy/sitekey
    • SiteKey
  • 3
    • 34548786769 scopus 로고    scopus 로고
    • The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies,
    • in The
    • Stuart E. Schechter et al., "The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies, " in The IEEE Symp. on Security and Privacy, 2007
    • (2007) IEEE Symp. on Security and Privacy
    • Schechter, S.E.1
  • 4
    • 84871400671 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report Volume XH
    • Sep
    • "Symantec Internet Security Threat Report Volume XH," http://www.symantec.cam/business, Sep. 2007.
    • (2007)
  • 6
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: A review
    • R. J. Bolton and D. J. Hand., "Statistical fraud detection: A review," in Statistical Science, 17(3), 2002.
    • (2002) Statistical Science , vol.17 , Issue.3
    • Bolton, R.J.1    Hand, D.J.2
  • 13
    • 51849159364 scopus 로고    scopus 로고
    • "Bharosa Tracker," http://www.bharosa.com
  • 15
    • 47949107361 scopus 로고    scopus 로고
    • Tewfiq El Maliki et al., A Survey of User-centric Identity Management Technologies, in SECUREWARE 2007, 2007.
    • Tewfiq El Maliki et al., "A Survey of User-centric Identity Management Technologies," in SECUREWARE 2007, 2007.
  • 16
    • 51849092362 scopus 로고    scopus 로고
    • GUIDE-ME: Georgia Tech User-Centric Identity Management Environment, isis.poly.edu/disw07/presentations/Ahamad%20Poly%20Talk.ppt
    • "GUIDE-ME: Georgia Tech User-Centric Identity Management Environment," isis.poly.edu/disw07/presentations/Ahamad%20Poly%20Talk.ppt
  • 18
    • 10444262112 scopus 로고    scopus 로고
    • p0f: Passive OS Fingerprinting tool
    • M. Zalewski, "p0f: Passive OS Fingerprinting tool." http://lcammf.coredump.cx/p0f.shtml.
    • Zalewski, M.1
  • 21
    • 51849140256 scopus 로고    scopus 로고
    • MaxMind, "GeoIP," http://www.maxmind.com
    • GeoIP
  • 23
    • 51849091256 scopus 로고    scopus 로고
    • Geolocalization on the Internet through Constraint Satisfection
    • Bernard Wong, et al., "Geolocalization on the Internet through Constraint Satisfection," in Proc of WORLDS, 2006.
    • (2006) Proc of WORLDS
    • Wong, B.1
  • 24
    • 0036095845 scopus 로고    scopus 로고
    • Enhancing Profiles for Anomaly Detection Using Time Granularities
    • Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," in Journal of Computer Security, 10(2), 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.2
    • Li, Y.1    Wu, N.2    Jajodia, S.3    Wang, X.S.4
  • 27
    • 3042823619 scopus 로고    scopus 로고
    • Email-Based Identification and Authentication: An Alternative to PKT?
    • Simson L Garfinkel, "Email-Based Identification and Authentication: An Alternative to PKT?" in IEEE Security & Privacy, 1(6), 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6
    • Garfinkel, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.