메뉴 건너뛰기




Volumn 4, Issue 3, 2010, Pages 40-50

Goals and practices in maintaining information systems security

Author keywords

Authentication; Availability; Confdentially; Integrity; Intrusion detection systems (IDS); Intrusion prevention systems (IPS); Security policy

Indexed keywords

AUTHENTICATION; AVAILABILITY; INFORMATION SYSTEMS; INFORMATION USE; SECURITY SYSTEMS;

EID: 79956159640     PISSN: 19301650     EISSN: 19301669     Source Type: Journal    
DOI: 10.4018/jisp.2010070103     Document Type: Article
Times cited : (5)

References (46)
  • 1
    • 9544226886 scopus 로고    scopus 로고
    • A piece of yourself: Ethical issues in biometric identification
    • doi:10.1023/B:ETIN.0000006918.22060.1f
    • Alterman, A. (2003). A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology, 5(3), 139-150. doi:10.1023/B:ETIN.0000006918.22060.1f
    • (2003) Ethics and Information Technology , vol.5 , Issue.3 , pp. 139-150
    • Alterman, A.1
  • 3
    • 0142253852 scopus 로고    scopus 로고
    • ADAM: A testbed for exploring the use of data mining in intrusion detection
    • Barbará, D., Couto, J., Jajodia, S., & Wu, N. (2001). ADAM: A testbed for exploring the use of data mining in intrusion detection. SIGMOD Record, 30(4), 15-24. (Pubitemid 33720995)
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 15-24
    • Barbara, D.1    Couto, J.2    Jajodia, S.3    Wu, N.4
  • 4
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • McDonald, S., Waern, Y., & Cockton, G. Eds., Sunderland, UK: Springer
    • Brostoff, S., & Sasse, M. A. (2000). Are passfaces more usable than passwords? A field trial investigation. In McDonald, S., Waern, Y., & Cockton, G. (Eds.), People and Computers XIV - Usability or Else! Proceedings of HCI 2000 (pp. 405-424). Sunderland, UK: Springer.
    • (2000) People and Computers XIV - Usability Or Else! Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 5
    • 0031373072 scopus 로고    scopus 로고
    • Cognitive, associative and conventional passwords: Recall and guessing rates
    • PII S0167404897000084
    • Bunnell, J., Podd, J., Henderson, R., Napier, R., & Kennedy-Moffat, J. (1997). Cognitive, associative and conventional passwords: Recall and guessing rates. Computers & Security, 16(7), 629-641. doi:10.1016/S0167-4048 (97) 00008-4 (Pubitemid 127379008)
    • (1997) Computers and Security , vol.16 , Issue.7 , pp. 629-641
    • Bunnell, J.1    Podd, J.2    Henderson, R.3    Napier, R.4    Kennedy-Moffat, J.5
  • 6
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • Carstens, D. S., McCauley-Bell, P. R., Malone, L. C., & DeMara, R. F. (2004). Evaluation of the human impact of password authentication practices on information security. Information Science Journal, 7(1), 67-85. (Pubitemid 40659984)
    • (2004) Informing Science , vol.7 , pp. 67-85
    • Carstens, D.S.1    McCauley-Bell, P.R.2    Malone, L.C.3    DeMara, R.F.4
  • 7
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • doi:10.1287/isre.1080.0180
    • Cavusoglu, H., Raghunathan, S., & Cavusoglu, H. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217. doi:10.1287/isre.1080.0180
    • (2009) Information Systems Research , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 8
    • 0029213708 scopus 로고
    • Perceived acceptability of biometric security systems
    • doi:10.1016/0167-4048 95 00005-S
    • Deane, F., Barrelle, K., Henderson, R., & Mahar, D. (1995). Perceived acceptability of biometric security systems. Computers & Security, 14(3), 225-231. doi:10.1016/0167-4048 (95) 00005-S
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 225-231
    • Deane, F.1    Barrelle, K.2    Henderson, R.3    Mahar, D.4
  • 9
    • 79956129487 scopus 로고    scopus 로고
    • Authentication methods for computer systems security
    • Khosrow-Pour, M. Ed., 2nd ed., Hershey, PA: Information Science Reference
    • Erlich, Z., & Zviran, M. (2009). Authentication methods for computer systems security. In Khosrow-Pour, M. (Ed.), Encyclopedia of information science and technology (2nd ed., Vol. 1, pp. 288-293). Hershey, PA: Information Science Reference.
    • (2009) Encyclopedia of Information Science and Technology , vol.1 , pp. 288-293
    • Erlich, Z.1    Zviran, M.2
  • 10
    • 0033633028 scopus 로고    scopus 로고
    • Authentication and supervision: A survey of user attitudes
    • doi:10.1016/S0167-4048 00 06027-2
    • Furnell, S. M., Dowland, P. S., Illingworth, H. M., & Reynolds, P. L. (2000). Authentication and supervision: A survey of user attitudes. Computers & Security, 19(6), 529-539. doi:10.1016/S0167-4048 (00) 06027-2
    • (2000) Computers & Security , vol.19 , Issue.6 , pp. 529-539
    • Furnell, S.M.1    Dowland, P.S.2    Illingworth, H.M.3    Reynolds, P.L.4
  • 11
    • 3943091225 scopus 로고    scopus 로고
    • A long-term trial of alternative user authentication technologies
    • doi:10.1108/09685220410530816
    • Furnell, S. M., Papadopoulos, I., & Dowland, P. S. (2004). A long-term trial of alternative user authentication technologies. Information Management & Computer Security, 12(2), 178-190. doi:10.1108/ 09685220410530816
    • (2004) Information Management & Computer Security , vol.12 , Issue.2 , pp. 178-190
    • Furnell, S.M.1    Papadopoulos, I.2    Dowland, P.S.3
  • 12
    • 33947692292 scopus 로고    scopus 로고
    • Analysis of active intrusion prevention data for predicting hostile activity in computer networks
    • DOI 10.1145/1232743.1232749
    • Green, I., Raz, T., & Zviran, M. (2007). Analysis of active intrusion prevention data for predicting hostile activity in computer networks. Communications of the ACM, 50(4), 63-68. doi:10.1145/1232743.1232749 (Pubitemid 46494529)
    • (2007) Communications of the ACM , vol.50 , Issue.4 , pp. 63-68
    • Green, I.1    Raz, T.2    Zviran, M.3
  • 13
    • 0347656710 scopus 로고    scopus 로고
    • Understanding users' keystroke patterns for computer access security
    • doi:10.1016/S0167-4048 03 00010-5
    • Guven, A., & Sogukpinar, I. (2003). Understanding users' keystroke patterns for computer access security. Computers & Security, 22(8), 695-706. doi:10.1016/S0167-4048 (03) 00010-5
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 695-706
    • Guven, A.1    Sogukpinar, I.2
  • 14
    • 0005661981 scopus 로고
    • Question-andanswer passwords: An empirical evaluation
    • doi:10.1016/0306-4379 91 90005-T
    • Haga, W. J., & Zviran, M. (1991). Question-andanswer passwords: An empirical evaluation. Information Systems, 16(3), 335-343. doi:10.1016/0306-4379 (91) 90005-T
    • (1991) Information Systems , vol.16 , Issue.3 , pp. 335-343
    • Haga, W.J.1    Zviran, M.2
  • 15
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • doi:10.1145/975817.975820
    • Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communications of the ACM, 47(4), 75-78. doi:10.1145/975817. 975820
    • (2004) Communications of the ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 16
    • 0002326595 scopus 로고    scopus 로고
    • Biometric identification
    • doi:10.1145/328236.328110
    • Jain, A. K., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 90-98. doi:10.1145/328236. 328110
    • (2000) Communications of the ACM , vol.43 , Issue.2 , pp. 90-98
    • Jain, A.K.1    Hong, L.2    Pankanti, S.3
  • 17
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • doi:10.1016/j.cose.2003.11.005
    • Juang, W. S. (2004). Efficient password authenticated key agreement using smart cards. Computers & Security, 23(2), 167-173. doi:10.1016/j.cose.2003. 11.005
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.S.1
  • 18
    • 0029214744 scopus 로고
    • Biometrics, is it a viable proposition for identity authentication and access control?
    • doi:10.1016/0167-4048 95 97054-E
    • Kim, H. J. (1995). Biometrics, is it a viable proposition for identity authentication and access control? Computers & Security, 14(3), 205-214. doi:10.1016/0167-4048 (95) 97054-E
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 205-214
    • Kim, H.J.1
  • 19
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based user authentication scheme using smart cards
    • doi:10.1109/TCE.2004.1277863
    • Ku, W.-C., & Chen, S.-M. (2004). Weaknesses and improvements of an efficient password based user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 204-207. doi:10.1109/TCE.2004. 1277863
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.-C.1    Chen, S.-M.2
  • 20
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • DOI 10.1145/358790.358797
    • Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770-772. doi:10.1145/358790.358797 (Pubitemid 12462508)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport Leslie1
  • 21
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (AAIS): A comparative survey
    • doi:10.1016/j.cose.2004.06.013
    • Lopez, J., Oppliger, R., & Pernul, G. (2004). Authentication and authorization infrastructures (AAIS): A comparative survey. Computers & Security, 23(7), 578-590. doi:10.1016/j.cose.2004.06.013
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 22
    • 0033706859 scopus 로고    scopus 로고
    • A biometric standard for information management and security
    • doi:10.1016/S0167-4048 00 05029-X
    • Matyas, S. M., & Stapleton, J. (2000). A biometric standard for information management and security. Computers & Security, 19(5), 428-441. doi:10.1016/S0167-4048 (00) 05029-X
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 428-441
    • Matyas, S.M.1    Stapleton, J.2
  • 23
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • doi:10.1016/0167-4048 88 90325-2
    • Menkus, B. (1988). Understanding the use of passwords. Computers & Security, 7(2), 132-136. doi:10.1016/0167-4048 (88) 90325-2
    • (1988) Computers & Security , vol.7 , Issue.2 , pp. 132-136
    • Menkus, B.1
  • 24
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • doi:10.1109/JPROC.2003.819605
    • O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2019-2040. doi:10.1109/JPROC.2003.819605
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2019-2040
    • O'Gorman, L.1
  • 25
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • doi:10.1109/MSECP.2003.1193209
    • Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security and Privacy Magazine, 1(2), 33-42. doi:10.1109/MSECP.2003.1193209
    • (2003) IEEE Security and Privacy Magazine , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 29
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • DOI 10.1023/A:1011902718709
    • Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the 'weakest link': A human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131. doi:10.1023/A:1011902718709 (Pubitemid 32903117)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 30
    • 40149101270 scopus 로고    scopus 로고
    • Artificial immune systems in the context of misbehavior detection
    • DOI 10.1080/01969720701853434, PII 791058237
    • Schaust, S., & Szczerbicka, H. (2008). Artificial immune systems in the context of misbehavior detection. Cybernetics and Systems, 39(2), 136-154. doi:10.1080/01969720701853434 (Pubitemid 351327108)
    • (2008) Cybernetics and Systems , vol.39 , Issue.2 , pp. 136-154
    • Schaust, S.1    Szczerbicka, H.2
  • 31
    • 0025840878 scopus 로고    scopus 로고
    • A dynamic password authentication method using a one-way function
    • doi:10.1002/scj.4690220704
    • Shimizu, A. (2007). A dynamic password authentication method using a one-way function. Systems and Computers in Japan, 22(7), 32-40. doi:10.1002/scj.4690220704
    • (2007) Systems and Computers in Japan , vol.22 , Issue.7 , pp. 32-40
    • Shimizu, A.1
  • 34
    • 0028406329 scopus 로고
    • Pass-sentence: A new approach to computer code
    • doi:10.1016/0167-4048 94 90064-7
    • Spector, Y., & Ginzberg, J. (1994). Pass-sentence: A new approach to computer code. Computers & Security, 13(2), 145-160. doi:10.1016/0167-4048 (94) 90064-7
    • (1994) Computers & Security , vol.13 , Issue.2 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2
  • 35
    • 0028407392 scopus 로고
    • Smartcards: A security assessment
    • doi:10.1016/0167-4048 94 90056-6
    • Svigals, J. (1994). Smartcards: A security assessment. Computers & Security, 13(2), 107-114. doi:10.1016/0167-4048 (94) 90056-6
    • (1994) Computers & Security , vol.13 , Issue.2 , pp. 107-114
    • Svigals, J.1
  • 39
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
    • Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., & Memon, N. (2005). Passpoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127. doi:10.1016/j.ijhcs.2005.04.010 (Pubitemid 40753495)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 40
    • 0142007144 scopus 로고    scopus 로고
    • A user friendly remote authentication scheme with smart cards
    • doi:10.1016/S0167-4048 03 00616-3
    • Wu, S.-T., & Chieu, B.-C. (2003). A user friendly remote authentication scheme with smart cards. Computers & Security, 22(6), 547-550. doi:10.1016/S0167-4048 (03) 00616-3
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 547-550
    • Wu, S.-T.1    Chieu, B.-C.2
  • 42
    • 3042852406 scopus 로고    scopus 로고
    • Keystroke dynamics identity verification: Its problems and practical solutions
    • doi:10.1016/j.cose.2004.02.004
    • Yu, E., & Cho, S. (2004). Keystroke dynamics identity verification: Its problems and practical solutions. Computers & Security, 23(5), 428-440. doi:10.1016/j.cose.2004.02.004
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 428-440
    • Yu, E.1    Cho, S.2
  • 43
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • doi:10.2753/MIS0742-1222240110
    • Yue, W. T., & Cakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353. doi:10.2753/MIS0742-1222240110
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.T.1    Cakanyildirim, M.2
  • 46
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • doi:10.1093/comjnl/36.3.227
    • Zviran, M., & Haga, W. J. (1993). A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3), 227-237. doi:10.1093/comjnl/36.3.227
    • (1993) The Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.