Show simple item record

Cognitive Security for Personal Devices

dc.date.accessioned2008-03-24T18:15:12Z
dc.date.accessioned2018-11-26T22:25:12Z
dc.date.available2008-03-24T18:15:12Z
dc.date.available2018-11-26T22:25:12Z
dc.date.issued2008-03-17en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/40810
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/40810
dc.description.abstractHumans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate users by challenging them to repeat a secret rather than by continually observing the many subtle cues offered by their appearance and behavior. We propose three lines of research that can be combined to produce cognitive security on computers and other personal devices: imprinting and continuously deployed multi-modal biometrics, self-protection through virtualization and trusted computing, and adjustably autonomous security.en_US
dc.format.extent6 p.en_US
dc.relationMassachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratoryen_US
dc.relationen_US
dc.subjectartificial intelligenceen_US
dc.subjecttrusted computingen_US
dc.titleCognitive Security for Personal Devicesen_US


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2008-016.pdf189.7Kbapplication/pdfView/Open
MIT-CSAIL-TR-2008-016.ps73.87Kbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record