Performance Analysis of Dynamic ABAC Systems using a Queuing Theoretic Framework [0.03%]
基于排队理论框架的动态ABAC系统性能分析
Gaurav Madkaikar,Karthikeya S M Yelisetty,Shamik Sural et al.
Gaurav Madkaikar et al.
A policy comprised of a set of rules forms the backbone of Attribute-based Access Control (ABAC) systems. Every incoming request is checked against such a policy and if at least one rule grants the access, it is allowed. Else, access is den...
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study [0.03%]
基于德国冠状病毒警告应用程序的纵向用户研究:接触者追踪应用隐私计算模型及使用行为分析
David Harborth,Sebastian Pape
David Harborth
The SARS-CoV-2 pandemic is a pressing societal issue today. The German government promotes a contract tracing app named Corona-Warn-App (CWA), aiming to change citizens' health behaviors during the pandemic by raising awareness about potent...
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention [0.03%]
工作压力和任务完成辩护对员工非恶意信息安全政策违背意愿的影响研究
Randi Jiang,Jianru Zhang
Randi Jiang
As businesses have had to change how they operate due to the coronavirus pandemic, the need for remote work has risen. With the continuous advancements in technology and increases in typical job demands, employees need to increase their wor...
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains [0.03%]
新冠肺炎疫情期间网络钓鱼攻击的发展趋势分析——基于对1100余个仿冒网站的分析研究
Raphael Hoheisel,Guido van Capelleveen,Dipti K Sarmah et al.
Raphael Hoheisel et al.
To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phis...
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic [0.03%]
COVID-19时代的网络安全:疫情时期网络犯罪和网络攻击的时间线和分析
Harjinder Singh Lallie,Lynsay A Shepherd,Jason R C Nurse et al.
Harjinder Singh Lallie et al.
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. As...
Efficient ABAC based information sharing within MQTT environments under emergencies [0.03%]
紧急情况下基于ABAC的MQTT环境内高效的信息共享机制研究
Pietro Colombo,Elena Ferrari,Engin Deniz Tümer
Pietro Colombo
Recent emergencies, such as the COVID-19 pandemic have shown how timely information sharing is essential to promptly and effectively react to emergencies. Internet of Things has magnified the possibility of acquiring information from differ...
Rajesh Kumar,Siddharth Sharma,Chirag Vachhani et al.
Rajesh Kumar et al.
This paper examines the transition in the cyber-security discipline induced by the ongoing COVID-19 pandemic. Using the classical information retrieval techniques, a more than twenty thousand documents are analyzed for the cyber content. In...
Misinformation warnings: Twitter's soft moderation effects on COVID-19 vaccine belief echoes [0.03%]
有关新冠疫苗信念回声效应的推特软管理警告信息的影响研究
Filipo Sharevski,Raniem Alsaadi,Peter Jachim et al.
Filipo Sharevski et al.
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users about the spread of COVID-19 misinformation. This form of soft moderation comes in two forms: as an interstitial cover before the Tweet is displ...
Ransomware: Recent advances, analysis, challenges and future research directions [0.03%]
勒索软件:最近的进展、分析、挑战和未来研究方向
Craig Beaman,Ashley Barkworth,Toluwalope David Akande et al.
Craig Beaman et al.
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, ...
Jason N Doctor,Jaideep Vaidya,Xiaoqian Jiang et al.
Jason N Doctor et al.
Secure computation of equivalence has fundamental application in many different areas, including health-care. We study this problem in the context of matching an individual's identity to link medical records across systems under the sociali...