User account access graphs
- Submitting institution
-
Heriot-Watt University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 27416356
- Type
- E - Conference contribution
- DOI
-
10.1145/3319535.3354193
- Title of conference / published proceedings
- CCS 2019: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
- First page
- 1405
- Volume
- -
- Issue
- -
- ISSN
- -
- Open access status
- -
- Month of publication
- November
- Year of publication
- 2019
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- 0
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Published in ACM CCS, a top-tier conference in Computer Security and the flagship annual conference of ACM's Special Interest Group on Security, Audit and Control (SIGSAC). Originality: This paper provides the foundation to properly reason about user account security, considering the user's environment, devices, and relations between all of the user's accounts. Previously user account security was reduced to password complexity and password reuse. Contribution: Framework to reason about user account security, algorithms, scoring schemes.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -