Author:Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NNDate:Sep 2017This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous work to move ...Read more
Author:Mosola, NN; Dlamini, Thandokuhle M; Blackledge, JM; Eloff, JHP; Venter, HSDate:Sep 2017Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks ...Read more