Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
Biometric Identification 生物识别
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989709342534
Donald R. Richards
{"title":"Biometric Identification","authors":"Donald R. Richards","doi":"10.1080/10658989709342534","DOIUrl":"https://doi.org/10.1080/10658989709342534","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security: Behind the Telecommuting Power Curve 信息安全:远程办公力量曲线的背后
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342461
Harry B. DeMaio
{"title":"Information Security: Behind the Telecommuting Power Curve","authors":"Harry B. DeMaio","doi":"10.1080/10658989409342461","DOIUrl":"https://doi.org/10.1080/10658989409342461","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Viruses 计算机病毒
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559208551314
R. Moeller
{"title":"Computer Viruses","authors":"R. Moeller","doi":"10.1080/19393559208551314","DOIUrl":"https://doi.org/10.1080/19393559208551314","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Effective Development of Secure Applications 经济高效的安全应用开发
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551356
D. S. Bauer
{"title":"Cost-Effective Development of Secure Applications","authors":"D. S. Bauer","doi":"10.1080/19393559308551356","DOIUrl":"https://doi.org/10.1080/19393559308551356","url":null,"abstract":"During the last decade, software quality studies proved that poorly conceived and developed software resulted in greatly magnified maintenance costs. In reaction, new software development practices were introduced. Such modern software development methodologies are based on a highly interactive design process that involves the customer at every step. (Note that for purposes of this discussion a customer can refer to an internal department as well as an external partner or client.) Unfortunately, these new practices seem to have been forgotten when it comes to designing and implementing application security controls. This is evident from analysis of the costs associated with applications security controls. The majority of these costs can be attributed either to the reengineering of existing controls to make them conform to security requirements or to the administration of inefficient, overly secured systems.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting the Portable Computing Environment 保护便携式计算环境
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342512
P. Maier
{"title":"Protecting the Portable Computing Environment","authors":"P. Maier","doi":"10.1080/10658989509342512","DOIUrl":"https://doi.org/10.1080/10658989509342512","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Micro-Mainframe Security Micro-Mainframe安全
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559208551315
Angel L. Rivera
{"title":"Micro-Mainframe Security","authors":"Angel L. Rivera","doi":"10.1080/19393559208551315","DOIUrl":"https://doi.org/10.1080/19393559208551315","url":null,"abstract":"The widespread use and availability of microcomputers and local area networks (LANs) has drastically changed the way in which users do computing and access mainframes. Communications technology and LANs have increased the capability to interconnect computers remotely and locally. Users are demanding access to mainframe data bases, whether it be through dial-up lines, gateways, or 3270/coaxial connections. Unfortunately, many organizations are still focusing solely on physically and logically protecting the mainframe and its applications, which may not be sufficient to ensure the security of information on these systems. Statistics concerning computer crime indicate that most computer crime is committed by insiders, which implies that these criminals already have some form of access to the mainframe. Because it is common for log-on, user identification, and other data for these mainframes to travel over communications lines in cleartext, anyone with access to a microcomputer connected to the mainframe can ...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Thirty-Minute Risk Analysis 30分钟风险分析
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342467
D. Erwin
{"title":"The Thirty-Minute Risk Analysis","authors":"D. Erwin","doi":"10.1080/10658989409342467","DOIUrl":"https://doi.org/10.1080/10658989409342467","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133397644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single Sign-on: Problems and Solutions 单点登录:问题和解决方案
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342498
Peter D. Goldis
{"title":"Single Sign-on: Problems and Solutions","authors":"Peter D. Goldis","doi":"10.1080/10658989509342498","DOIUrl":"https://doi.org/10.1080/10658989509342498","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure I-voting system using QR code and biometric authentication 使用QR码和生物识别认证的安全投票系统
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393555.2020.1867261
S. Ajish, K. A. Kumar
{"title":"Secure I-voting system using QR code and biometric authentication","authors":"S. Ajish, K. A. Kumar","doi":"10.1080/19393555.2020.1867261","DOIUrl":"https://doi.org/10.1080/19393555.2020.1867261","url":null,"abstract":"ABSTRACT The Estonian i–voting system uses the PIN of the national ID card for the authentication of the voter. The vote modification malware, re-voting malware, and self-voting malware can easily record the PIN and change the vote or secretly cast a vote. The bad verification attack can easily change the encrypted ballot sent to the verification application because the public key of the server encrypts it. This study presents a secure internet voting and verification protocol that conquers the malware in the internet voting system. The proposed method uses the QR code and fingerprint biometric authentication provided by the Aadhaar card in India. The use of a parameter q modifies the voting and verification protocol. Only the parameter q display on the screen for verification, thereby, conserves the vote’s secrecy. The parameter q provides a second level of authentication in the voting protocol. The fingerprint biometric authentication exhibits better security against the vote modification malware, re-voting malware, and self-voting malware. The parameter q is digitally signed using the server’s private key before it is sent to the verification application to defend against the bad verification attack.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122874231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Technology and Privacy Collide 当技术和隐私发生冲突
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342511
Edward H. Freeman
{"title":"When Technology and Privacy Collide","authors":"Edward H. Freeman","doi":"10.1080/10658989509342511","DOIUrl":"https://doi.org/10.1080/10658989509342511","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信