首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
世界政治   1篇
法律   2篇
  2015年   1篇
  2010年   2篇
排序方式: 共有3条查询结果,搜索用时 15 毫秒
1
1.
2.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics.  相似文献   
3.
Biometrics contributes a new dimension to authentication and identification process of persons. Besides knowledge (passwords) and possession (smart cards), biometrics provides new means of personal identification. Biometrics procedures are used to recognize or verify behavioral or physical characteristics of a person. Also biometry provides us with a user-friendly method for automatically identification and becoming a competitor for current identification systems, especially for electronic transactions. Cause of biometric increasing position in electronic transaction and security identification system we must to assure perfect information security tools to purpose stability such a systems. But before deploying any security tools or system, one should carefully examine the sensibility and added value of it, as we do in our daily work. However, there are ways to compromise a system based on biometric identification. This article focuses on the future and draw-after of biometric identification, specifically implication on tomorrow's network society.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号