首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Selecting an IT Control Framework 选择IT控制框架
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980701225440
Steven Schlarman
This article originally published in EDPACS 35(2), February 2007, pp 11–17.
本文最初发表于EDPACS 35(2), 2007年2月,第11-17页。
{"title":"Selecting an IT Control Framework","authors":"Steven Schlarman","doi":"10.1080/10658980701225440","DOIUrl":"https://doi.org/10.1080/10658980701225440","url":null,"abstract":"This article originally published in EDPACS 35(2), February 2007, pp 11–17.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74045400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing Information Lifecycle Security (ILS) 实现信息生命周期安全(ILS)
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980601144907
Bill Reed
* This article originally published in EDPACS 35(2), February 2007, pp 18–24.
*本文最初发表于EDPACS 35(2), 2007年2月,第18-24页。
{"title":"Implementing Information Lifecycle Security (ILS)","authors":"Bill Reed","doi":"10.1080/10658980601144907","DOIUrl":"https://doi.org/10.1080/10658980601144907","url":null,"abstract":"* This article originally published in EDPACS 35(2), February 2007, pp 18–24.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73039137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Handheld Devices Become Trusted Network Devices 无线手持设备成为受信任的网络设备
Q4 Social Sciences Pub Date : 2007-05-01 DOI: 10.1080/10658980701401686
K. Curran, P. Canning
ABSTRACT In the world of information technology, a security model is only as secure as its weakest link. There are several layers of security and different measures that can currently be implemented. However, they lack coordination, and therefore potential security breaches might compromise the network. With wireless access becoming the norm, and users requiring “on the move communication” even within a campus, networks are expanding past the traditional wired networks by adding wireless access points. This gives customers the flexibility they require but leaves a net threat vector to the network. There have been various encryption and security steps taken to validate the communication and authentication of the devices and end users connecting. This project addresses the critical problem of secure authentication using the 802.1x standard, which will be implemented using Microsoft's Radius server elements. It will involve the enrollment of secure certificates on Windows mobile devices, thus securing mobile devices from physical attacks. To ensure that all steps are adhered to, that all necessary applications have been installed, and to handle Web service communication, an application will be created that will provide an automated solution.
在信息技术的世界里,一个安全模型的安全性取决于其最薄弱的环节。目前可以实现多个安全层和不同的措施。然而,它们缺乏协调,因此潜在的安全漏洞可能会危及网络。随着无线接入成为常态,用户甚至在校园内也需要“移动通信”,网络正在通过增加无线接入点来扩展传统的有线网络。这为客户提供了所需的灵活性,但也给网络留下了一个净威胁向量。已经采取了各种加密和安全措施来验证连接的设备和最终用户的通信和身份验证。该项目解决了使用802.1x标准进行安全认证的关键问题,该标准将使用微软的Radius服务器元素来实现。它将涉及在Windows移动设备上注册安全证书,从而保护移动设备免受物理攻击。为了确保遵守所有步骤,安装了所有必要的应用程序,并处理Web服务通信,将创建一个应用程序来提供自动化解决方案。
{"title":"Wireless Handheld Devices Become Trusted Network Devices","authors":"K. Curran, P. Canning","doi":"10.1080/10658980701401686","DOIUrl":"https://doi.org/10.1080/10658980701401686","url":null,"abstract":"ABSTRACT In the world of information technology, a security model is only as secure as its weakest link. There are several layers of security and different measures that can currently be implemented. However, they lack coordination, and therefore potential security breaches might compromise the network. With wireless access becoming the norm, and users requiring “on the move communication” even within a campus, networks are expanding past the traditional wired networks by adding wireless access points. This gives customers the flexibility they require but leaves a net threat vector to the network. There have been various encryption and security steps taken to validate the communication and authentication of the devices and end users connecting. This project addresses the critical problem of secure authentication using the 802.1x standard, which will be implemented using Microsoft's Radius server elements. It will involve the enrollment of secure certificates on Windows mobile devices, thus securing mobile devices from physical attacks. To ensure that all steps are adhered to, that all necessary applications have been installed, and to handle Web service communication, an application will be created that will provide an automated solution.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83691577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management 基于身份的加密:从身份和访问管理到企业隐私管理
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051268
Luther Martin
ates is difficult to understand. It is a bewildering array of legislation that requires the protection of many types of data, or limits access to this data to only authorized personnel. Managing the identities and roles of personnel who can access sensitive data can be accomplished using existing Identity and Access Management (IAM) technologies and Identity-based Encryption (IBE). IBE, a new encryption technology that uses such identity information as an encryption key, promises to provide a way to use an IAM infrastructure to address the challenges of maintaining the privacy of sensitive corporate data.
这很难理解。这是一系列令人眼花缭乱的立法,要求保护许多类型的数据,或者限制只有授权人员才能访问这些数据。管理可以访问敏感数据的人员的身份和角色可以使用现有的身份和访问管理(IAM)技术和基于身份的加密(IBE)来完成。IBE是一种使用此类身份信息作为加密密钥的新加密技术,有望提供一种使用IAM基础设施来解决维护敏感企业数据隐私的挑战。
{"title":"Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management","authors":"Luther Martin","doi":"10.1080/10658980601051268","DOIUrl":"https://doi.org/10.1080/10658980601051268","url":null,"abstract":"ates is difficult to understand. It is a bewildering array of legislation that requires the protection of many types of data, or limits access to this data to only authorized personnel. Managing the identities and roles of personnel who can access sensitive data can be accomplished using existing Identity and Access Management (IAM) technologies and Identity-based Encryption (IBE). IBE, a new encryption technology that uses such identity information as an encryption key, promises to provide a way to use an IAM infrastructure to address the challenges of maintaining the privacy of sensitive corporate data.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10658980601051268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72463719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From the Editor's Desk 从编辑部
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980701331594
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701331594","DOIUrl":"https://doi.org/10.1080/10658980701331594","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82357792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Good and Not So Good of Enforcing Password Composition Rules 执行密码组合规则的好与不好
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051375
John Campbell, Dale Kleeman, Wanli Ma
ABSTRACT Many systems rely on password composition rules to force users to choose more secure passwords. The findings discussed here are from a study on the enforcement of good password practice in the form of password composition rules. The results show that the enforcement of password composition rules does not discourage users from using meaningful information in passwords. While composition rules reduce password reuse, the overall incidence remains high. Passwords created under these conditions are also perceived to be more difficult to remember. Nevertheless, the enforcement of password composition rules does significantly improve protection against dictionary-based attack.
许多系统依靠密码组合规则来强制用户选择更安全的密码。这里讨论的结果来自于一项以密码组合规则的形式实施良好密码实践的研究。结果表明,密码组合规则的实施并没有阻止用户在密码中使用有意义的信息。虽然组合规则减少了密码重用,但总体发生率仍然很高。在这种情况下创建的密码也被认为更难记住。尽管如此,密码组合规则的实施确实大大提高了对基于字典的攻击的保护。
{"title":"The Good and Not So Good of Enforcing Password Composition Rules","authors":"John Campbell, Dale Kleeman, Wanli Ma","doi":"10.1080/10658980601051375","DOIUrl":"https://doi.org/10.1080/10658980601051375","url":null,"abstract":"ABSTRACT Many systems rely on password composition rules to force users to choose more secure passwords. The findings discussed here are from a study on the enforcement of good password practice in the form of password composition rules. The results show that the enforcement of password composition rules does not discourage users from using meaningful information in passwords. While composition rules reduce password reuse, the overall incidence remains high. Passwords created under these conditions are also perceived to be more difficult to remember. Nevertheless, the enforcement of password composition rules does significantly improve protection against dictionary-based attack.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84661703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The Future of Cryptography 密码学的未来
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051284
J. Callas
We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.
我们已经了解了密码学的起源,但它将走向何方?在这篇文章中,我提出了一些尚未解决的问题:我们必须应对的挑战。其中一些是房间里的大象,我们都忽略了,或者如果没有忽略,我们注意到它们在房间里,占据了很多空间,而且很难掸灰尘,然后我们回到上一个主题。还有一些是真正的难题,没有好的解决方案。还有一些是权衡。我们可以把这看作是一次在有趣的问题和令人惊讶的事情上的短暂停留。
{"title":"The Future of Cryptography","authors":"J. Callas","doi":"10.1080/10658980601051284","DOIUrl":"https://doi.org/10.1080/10658980601051284","url":null,"abstract":"We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76487452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Designing Networks that Enforce Information Security Policies 设计实施信息安全策略的网络
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051490
Al Malin
{"title":"Designing Networks that Enforce Information Security Policies","authors":"Al Malin","doi":"10.1080/10658980601051490","DOIUrl":"https://doi.org/10.1080/10658980601051490","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86617182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pump and Dump Scams 泵和转储骗局
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051755
Ken Dunham
A MASSIVE MARKETING CAMPAIGN HAS BEGUN FOR THE FIRST WEEK OF 2006. AND WE FEEL IT'S GOING TO HIT OVER 200% GAIN THIS WEEK WITH NEW INVESTORS AND BIG NEWS. THIS IS A HUGE PLAYER STARTING MONDAY, JAN. 2ND, AND WE 100% SAY PUT THIS ONE ON YOUR RADAR.
2006年的第一周,一场大规模的营销活动已经开始。我们认为,随着新的投资者和重大新闻的出现,本周它的涨幅将超过200%。从1月2日周一开始,这是一个重要的球员,我们100%建议你把它放在你的雷达上。
{"title":"Pump and Dump Scams","authors":"Ken Dunham","doi":"10.1080/10658980601051755","DOIUrl":"https://doi.org/10.1080/10658980601051755","url":null,"abstract":"A MASSIVE MARKETING CAMPAIGN HAS BEGUN FOR THE FIRST WEEK OF 2006. AND WE FEEL IT'S GOING TO HIT OVER 200% GAIN THIS WEEK WITH NEW INVESTORS AND BIG NEWS. THIS IS A HUGE PLAYER STARTING MONDAY, JAN. 2ND, AND WE 100% SAY PUT THIS ONE ON YOUR RADAR.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78776052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Through Deception 通过欺骗获得安全
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051458
S. Vidalis, Z. Kazmi
ABSTRACT For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.
对于信息安全的每一层,都有许多技术和工具可以用来确保信息优势。事实上,一些专家会认为,没有后者,就不可能有前者。然而,在当今技术和互联互通的世界中,信息优势很难实现,几乎不可能保持。本文将论证欺骗的艺术是一种可靠且成本有效的技术,可以确保基础设施的安全性。本文最后将提出上述陈述的技术解决方案。
{"title":"Security Through Deception","authors":"S. Vidalis, Z. Kazmi","doi":"10.1080/10658980601051458","DOIUrl":"https://doi.org/10.1080/10658980601051458","url":null,"abstract":"ABSTRACT For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76244349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1