Conference proceeding
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec, pp.27-30
ACM Conferences
CCS08: 15th ACM Conference on Computer and Communications Security 2008
10/27/2008
DOI: 10.1145/1456377.1456383
Abstract
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds-for example, computers authenticate users by challenging them to repeat a secret rather than by continually observing the many subtle cues offered by their appearance and behavior. We propose two lines of research that can be combined to produce cognitive security on computers and other personal devices: continuously deployed multi-modal biometrics and adjustably autonomous security.
Details
- Title: Subtitle
- Cognitive security for personal devices
- Creators
- Rachel Greenstadt - Drexel UniversityJacob Beal - IIT@MIT
- Resource Type
- Conference proceeding
- Publication Details
- Proceedings of the 1st ACM workshop on Workshop on AISec, pp.27-30
- Conference
- CCS08: 15th ACM Conference on Computer and Communications Security 2008
- Publisher
- ACM
- Series
- ACM Conferences
- DOI
- 10.1145/1456377.1456383
- ISSN
- 1543-7221
- Language
- English
- Date published
- 10/27/2008
- Academic Unit
- Electrical and Computer Engineering
- Record Identifier
- 9984627343902771
Metrics
1 Record Views