{"title":"Biometric Identification","authors":"Donald R. Richards","doi":"10.1080/10658989709342534","DOIUrl":"https://doi.org/10.1080/10658989709342534","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security: Behind the Telecommuting Power Curve","authors":"Harry B. DeMaio","doi":"10.1080/10658989409342461","DOIUrl":"https://doi.org/10.1080/10658989409342461","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Viruses","authors":"R. Moeller","doi":"10.1080/19393559208551314","DOIUrl":"https://doi.org/10.1080/19393559208551314","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-Effective Development of Secure Applications","authors":"D. S. Bauer","doi":"10.1080/19393559308551356","DOIUrl":"https://doi.org/10.1080/19393559308551356","url":null,"abstract":"During the last decade, software quality studies proved that poorly conceived and developed software resulted in greatly magnified maintenance costs. In reaction, new software development practices were introduced. Such modern software development methodologies are based on a highly interactive design process that involves the customer at every step. (Note that for purposes of this discussion a customer can refer to an internal department as well as an external partner or client.) Unfortunately, these new practices seem to have been forgotten when it comes to designing and implementing application security controls. This is evident from analysis of the costs associated with applications security controls. The majority of these costs can be attributed either to the reengineering of existing controls to make them conform to security requirements or to the administration of inefficient, overly secured systems.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting the Portable Computing Environment","authors":"P. Maier","doi":"10.1080/10658989509342512","DOIUrl":"https://doi.org/10.1080/10658989509342512","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-Mainframe Security","authors":"Angel L. Rivera","doi":"10.1080/19393559208551315","DOIUrl":"https://doi.org/10.1080/19393559208551315","url":null,"abstract":"The widespread use and availability of microcomputers and local area networks (LANs) has drastically changed the way in which users do computing and access mainframes. Communications technology and LANs have increased the capability to interconnect computers remotely and locally. Users are demanding access to mainframe data bases, whether it be through dial-up lines, gateways, or 3270/coaxial connections. Unfortunately, many organizations are still focusing solely on physically and logically protecting the mainframe and its applications, which may not be sufficient to ensure the security of information on these systems. Statistics concerning computer crime indicate that most computer crime is committed by insiders, which implies that these criminals already have some form of access to the mainframe. Because it is common for log-on, user identification, and other data for these mainframes to travel over communications lines in cleartext, anyone with access to a microcomputer connected to the mainframe can ...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single Sign-on: Problems and Solutions","authors":"Peter D. Goldis","doi":"10.1080/10658989509342498","DOIUrl":"https://doi.org/10.1080/10658989509342498","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure I-voting system using QR code and biometric authentication","authors":"S. Ajish, K. A. Kumar","doi":"10.1080/19393555.2020.1867261","DOIUrl":"https://doi.org/10.1080/19393555.2020.1867261","url":null,"abstract":"ABSTRACT The Estonian i–voting system uses the PIN of the national ID card for the authentication of the voter. The vote modification malware, re-voting malware, and self-voting malware can easily record the PIN and change the vote or secretly cast a vote. The bad verification attack can easily change the encrypted ballot sent to the verification application because the public key of the server encrypts it. This study presents a secure internet voting and verification protocol that conquers the malware in the internet voting system. The proposed method uses the QR code and fingerprint biometric authentication provided by the Aadhaar card in India. The use of a parameter q modifies the voting and verification protocol. Only the parameter q display on the screen for verification, thereby, conserves the vote’s secrecy. The parameter q provides a second level of authentication in the voting protocol. The fingerprint biometric authentication exhibits better security against the vote modification malware, re-voting malware, and self-voting malware. The parameter q is digitally signed using the server’s private key before it is sent to the verification application to defend against the bad verification attack.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122874231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Technology and Privacy Collide","authors":"Edward H. Freeman","doi":"10.1080/10658989509342511","DOIUrl":"https://doi.org/10.1080/10658989509342511","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}