z-logo
open-access-imgOpen Access
Aspectising honeytokens to contain the insider threat
Author(s) -
Padayachee Keshnee
Publication year - 2015
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0063
Subject(s) - insider threat , insider , aspectj , software deployment , computer science , aspect oriented programming , computer security , software engineering , programming language , software , political science , law
The aim of this study is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect‐oriented paradigm to contain the insider threat. This approach is tested by developing a proof‐of‐concept prototype in an aspect‐oriented language, namely AspectJ. This study also reflects on design and implementation challenges involved in the deployment of honeytokens to contain the insider threat. Consequently, aspect‐orientation is proposed as a means to resolve some of these challenges.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here