Institutional Repository

Aspectizing Honeytokens to Contain the Insider Threat

Show simple item record

dc.contributor.author Padayachee, Keshnee
dc.date.accessioned 2014-01-29T06:20:51Z
dc.date.available 2014-01-29T06:20:51Z
dc.date.issued 2014-01-29
dc.identifier.citation Padayachee, Keshnee 2014, "Aspectizing honeytokens to contain the insider threat", Preroria: University of South Africa. en
dc.identifier.uri http://hdl.handle.net/10500/13117
dc.description.abstract Abstract: The aim of this paper is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect-oriented paradigm to contain the insider threat. This approach is tested by developing a proof-of-concept prototype in an aspect-oriented language, namely AspectJ. The paper also reflects on design and implementation challenges involved with deploying honeytokens to contain the insider threat. Consequently aspect orientation is proposed as a means to resolve some of these challenges. en
dc.format.extent 1 online resource (23 leaves) en
dc.language.iso en en
dc.subject Honeytokens en
dc.subject.ddc 005.8
dc.subject.lcsh Internet -- Security measures en
dc.subject.lcsh Computer crimes -- Prevention en
dc.subject.lcsh Computer -- Access control en
dc.subject.lcsh Data protection -- Management en
dc.subject.lcsh Anomaly detection (Computer security) en
dc.title Aspectizing Honeytokens to Contain the Insider Threat en
dc.type Article en
dc.description.department Computer Science en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics