The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Hardware Secure Access to Servers and Applications
Abstract
In chapter 20 the authors propose a powerful yet inexpensive method for protecting and discriminating unauthorized accesses to sensible digital information (or even to the entire system) via common and conventional tools such as USB devices. The result of this work allows that the access to servers or the execution and access to specific data, take place only under a controlled and defined scenario.
Related Content
Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper.
© 2020.
26 pages.
|
Sylvain Maechler, Jean-Christophe Graz.
© 2020.
27 pages.
|
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig.
© 2020.
41 pages.
|
Jonas Lundsten, Jesper Mayntz Paasch.
© 2020.
21 pages.
|
Justus Alexander Baron.
© 2020.
31 pages.
|
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska.
© 2020.
19 pages.
|
Hiam Serhan, Doudja Saïdi-Kabeche.
© 2020.
30 pages.
|
|
|