N-Cryptographic Multilevel Algorithm for Effective Information Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A cryptographic key generation scheme for multilevel data security

In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are two problems associated with their scheme. First, a large value associated with each security class needs to be made public. Sec...

متن کامل

Multilevel security for information retrieval systems

Bhavani Thuraisingham is a lead engineer with the MITRE Corporation where she has initiated R & D activities in secure distributed database systems, secure object-oriented database systems, and secure intelligent database systems. She is currently working on multilevel object-oriented data models, approaches to handle the inference problem, theory of concurrency control for multilevel databases...

متن کامل

Multilevel security for information retrieval systems - II

In this paper we describe multilevel security issues for hypermedia-based information retrieval database management systems. We first summarize the discussion in our earlier paper on the use of object-oriented approach for developing secure information retrieval systems and then discuss in detail how such a system can be augmented by a Linker to provide hypermedia database management system cap...

متن کامل

Physical Security of Cryptographic Algorithm Implementations

This thesis deals with physical attacks on implementations of cryptographic algorithms and countermeasures against these attacks. Physical attacks exploit properties of an implementation such as leakage through physically observable parameters (side-channel analysis) or susceptibility to errors (fault analysis) to recover secret cryptographic keys. In the absence of adequate countermeasures suc...

متن کامل

The Need for Effective Information Security Awareness

Security awareness is an often-overlooked factor in an information security program. While organizations expand their use of advanced security technology and continuously train their security professionals, very little is used to increase the security awareness among the normal users, making them the weakest link in any organization. As a result, today, organized cyber criminals are putting sig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions on Networks and Communications

سال: 2014

ISSN: 2054-7420

DOI: 10.14738/tnc.25.504