An analysis on critical information security systems: A technical review tour and study of the sensitive information security methods and techniques

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information's security and delicacy make the electronic systems in a challenging and chasing phase when it is passed on from an end to other via Internet. In today's world, as the necessity and importance of sensitive information are growing with new advancements and technologies, they become more prone to attacks and oriented towards the insecure environment. Attackers always want just an attack on such information to either to use it or intercept it. In this direction, many researchers have put their good efforts not only just to provide information security, instead they also consider the related primary security concerns, like confidentiality, access control, integrity along with the quality issues of reliability, robustness, usability etc. This effort included and presented a technological advancement based comparative study of various Sensitive Information Security (SIS) models and their proposed methods, algorithms, and experimental results. This study provides a great forum and better understanding of these models with their respective advantages and disadvantages. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Kaushik, S., & Puri, S. (2012). An analysis on critical information security systems: A technical review tour and study of the sensitive information security methods and techniques. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 377–389). https://doi.org/10.1007/978-3-642-30111-7_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free