Aspectising honeytokens to contain the insider threat

11Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

The aim of this study is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect-oriented paradigm to contain the insider threat. This approach is tested by developing a proof-of-concept prototype in an aspect-oriented language, namely AspectJ. This study also reflects on design and implementation challenges involved in the deployment of honeytokens to contain the insider threat. Consequently, aspect-orientation is proposed as a means to resolve some of these challenges.

Cite

CITATION STYLE

APA

Padayachee, K. (2015). Aspectising honeytokens to contain the insider threat. IET Information Security, 9(4), 240–247. https://doi.org/10.1049/iet-ifs.2014.0063

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free