Institutional Repository

Browsing by Subject "Computer -- Access control"

Browsing by Subject "Computer -- Access control"

Sort by: Order: Results:

  • Padayachee, Keshnee (2014-01-29)
    Abstract: The aim of this paper is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect-oriented paradigm to contain the insider threat. This ...
  • Bechan, Upasna (2009-08-25)
    The continuing financial losses incurred by individuals and companies due to identity information being phished are necessitating more innovative approaches to solving the problem of phishing attacks at the company level. ...

Search UnisaIR

Browse

My Account