INFORMATION SYSTEM ACCESS CONTROL

Authors

  • Весна Алексић-Марић Економског факултета Универзитета у Бањој Луци

Keywords:

information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards

Abstract

Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation.

References

Diffie, W.; Hellman, M.E.: New Directions in Cryprography, Trans. IEEE on Information Systems, br. 6, 11/1976.

Henхerson, Stuart: The Information Systems Policy Statement, EХPACS, 1996.

Icove, D.; Seger, K.; VonStorch, W.: Computer Crime, O'Reilly & Associates, Inc., Sebastopol (CA), 1995.

Marić, V.; Stojanović, D.: Busness Intelligence and its Security, 5th International Conference, Dependability and Quality Management - DQM- 2002, June 2002, Belgrade, Serbia.

Stojanović, D.; Marić, V.: E-business and Methods for Obtaining Digital Signatures and Public Key Cryptosystems, International Conference of the Faculty of Economics Sarajevo - ICES 2002, Transition in Central and Eastern Europe, Challenges of 21st Century, Conference Proceedings, University of Sarajevo, Faculty of Economics, Sarajevo, Bosnia and Herzegovina, October 17-18, 2002.

Stojanović, D; Marić, V.: Cryptography in Computer Network Security, 6th International Conference, Dependability and Quality Management - DQM-2003, June 2003, Belgrade, Serbia.

Downloads

Published

2006-12-30

Issue

Section

Scientific papers

How to Cite

Similar Articles

1-10 of 195

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>