Virtual Invisible Disk Design for Information System Security
暂无分享,去创建一个
Information is one of the important enterprise assets for any organization or institute in order to facilitate dayto-day operation and effective decision-making. Access to the right information by the right people is increasingly vital in gaining a competitive advantage. However, managers of information system are facing real challenges with the growth of security risks created by intruders using modern hacking techniques. For this reason, it is imperative that these issues should be addressed in order to ensure security for the information system. This research focuses on three of the major issues related to information security: Confidentiality, Data Integrity and Availability of Services and Secure Information Storage. In this paper we present the Model of a Virtual Invisible Disk (VID) and discuss a timeout key session technique. The authentication method for the VID is based upon incorporating biological information into a secret key to Access the VID that can assist in overcoming the constantly growing security challenges.
[1] Simson L. Garfinkel,et al. Practical UNIX and Internet Security , 1996 .
[2] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[3] Graham Wrightson,et al. Computer money - a systematic overview of electronic payment systems , 1996 .
[4] T. C. Ting,et al. Information sharing and security in dynamic coalitions , 2002, SACMAT '02.
[5] Vijay T. Ahuja. Secure commerce on the Internet , 1996 .