Virtual Invisible Disk Design for Information System Security

Article


Nabi, Faisal. 2009. "Virtual Invisible Disk Design for Information System Security." International Journal of Network Security. 8 (2), pp. 131-138.
Article Title

Virtual Invisible Disk Design for Information System Security

ERA Journal ID212961
Article CategoryArticle
AuthorsNabi, Faisal
Journal TitleInternational Journal of Network Security
Journal Citation8 (2), pp. 131-138
Number of Pages8
Year2009
PublisherJalaxy Technology Co. Ltd.
Place of PublicationChina
ISSN1816-353X
1816-3548
Abstract

Information is one of the important enterprise assets for any organization or institute in order to facilitate day-to-day operation and effective decision-making. Access to the right information by the right people is increas-ingly vital in gaining a competitive advantage. However, managers of information system are facing real challenges with the growth of security risks created by intruders using modern hacking techniques. For this reason, it is imperative that these issues should be addressed in order to ensure security for the information system. This research focuses on three of the major issues related to information security: Confidentiality, Data Integrity and Availability of Services and Secure Information Storage. In this paper we present the Model of a Virtual Invisible Disk (VID) and discuss a timeout key session technique. The authentication method for the VID is based upon incorporating biological information into a secret key to Access the VID that can assist in overcoming the constantly growing security challenges.

KeywordsBiometrics; Confidentiality; Cryptography; Data integrity; Virtual invisible disk
Public Notes

There are no files associated with this item.

Byline AffiliationsColorado State University, United States
Library Services
Permalink -

https://research.usq.edu.au/item/wz7w1/virtual-invisible-disk-design-for-information-system-security

  • 57
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010
Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058
Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications
Nabi, Faisal. 2021. Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications. PhD by Publication Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/q7q82
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018
Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004
A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104
Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109
Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04
A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.
Designing a Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
Nabi, Faisal. 2011. "Designing a Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems." International Journal of Network Security. 12 (1), pp. 29-41.
Secure business application logic for e-commerce systems
Nabi, Faisal. 2005. "Secure business application logic for e-commerce systems." Computers and Security. 24 (3), pp. 208-217. https://doi.org/10.1016/j.cose.2004.08.008