IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hardware Secure Access to Servers and Applications

Hardware Secure Access to Servers and Applications
View Sample PDF
Author(s): José Antonio Álvarez Bermejo (Universidad de Almería, Spain), Juan Antonio López Ramos (Universidad de Almería, Spain)and Francisco Javier Gálvez Sánchez (Universidad de Almería, Spain)
Copyright: 2010
Pages: 19
Source title: Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues
Source Author(s)/Editor(s): Irene Maria Portela (Polytechnic Institute of Cávado and Ave, Portugal)and Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)
DOI: 10.4018/978-1-61520-975-0.ch020

Purchase

View Hardware Secure Access to Servers and Applications on the publisher's website for pricing and purchasing information.

Abstract

In chapter 20 the authors propose a powerful yet inexpensive method for protecting and discriminating unauthorized accesses to sensible digital information (or even to the entire system) via common and conventional tools such as USB devices. The result of this work allows that the access to servers or the execution and access to specific data, take place only under a controlled and defined scenario.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom