Cryptographic Protection of Computer-Based Data Files

نویسنده

  • Tom Murray
چکیده

This article explores the nature of cryptographic transformation and its application to the protection of data contained in files used by computer-based information systems. It presents some of the basic concepts of cryptography and structures of taxonomy of cryptographic transformations. The implications of computer oriented implementations of cryptographic protection are explored and the significance of such transformations for information systems is discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Combined hardware and cryptographic user data protection in personal computer systems and networks

Some methods for combined hardware and cryptographic protection of user data in personal computer systems and networks are described and considered in the paper. It is given an overview of the main types of cryptography, described ways of key distribution and the most known cryptographical algorithms at the beginning of the paper. Then the paper presents and describes practically implemented sy...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

SEFS: Security Module for Extensible File System Architectures

Data security is a fundamental issue in modern computer systems. In particular, data storage systems are frequently subject to attacks and so need protection. Typical storage systems rely on access control mechanisms, either physical or logical, to prevent unauthorized users from accessing stored data. However, such mechanisms are useless against non-ethical attitudes taken by privileged users,...

متن کامل

Shared Cryptography with Embedded Session Key for Secret Audio

In today's scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • MIS Quarterly

دوره 3  شماره 

صفحات  -

تاریخ انتشار 1979