TITLE

Documenting the Preliminary System Design

AUTHOR(S)
Khairallah, Michael
PUB. DATE
August 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p43
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on budgeting a first system design for the enterprise security. The first considerations in budgeting a system design are the counting and pricing of the end-point components in a security system. Other considerations include the labor costs and estimation of the incidental costs.
ACCESSION #
21973112

 

Related Articles

  • Capability Managers. Kieburtz, Richard B.; Silberschatz, Abraham // IEEE Transactions on Software Engineering;Nov78, Vol. 4 Issue 6, p467 

    The use of capabilities to control the access of component programs to resources in an operating system is an attractive means by which to provide a uniform protection mechanism. In this paper, a capability is defined as an abstract encapsulation of the data needed to define access to a...

  • The Application of Genetic Neural Network in Network Intrusion Detection. Hua Jiang; Junhu Ruan // Journal of Computers;Dec2009, Vol. 4 Issue 12, p1223 

    Traditional network security models have not meet the development of network technologies, so PPDR model emerged, as the times require. Instruction detection technology is an important composed part in PPDR model and it make up for the shortages of firewall and data security protection. This...

  • PASSWORD BASED A GENERALIZE ROBUST SECURITY SYSTEM DESIGN USING NEURAL NETWORK. Singh, Manoj Kumar // International Journal of Computer Science Issues (IJCSI);Jul2010, Vol. 7 Issue 4, p1 

    Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used. But this method having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt...

  • AN ACCESS CONTROL PATTERN BASED ON QUALIFICATIONS TO GRAND ACCESS TO PHYSIC RESOURCES. CRISTEA, Ana Daniela; PROSTEAN, Octavian; MUSCHALIK, Thomas; TIRIAN, Gehi Ovidiu // Annals of DAAAM & Proceedings;Jan2009, p1765 

    The main function of the access control is to prevent the access of the unauthorized users to protected objects. in this article we present, through UML diagrams, an access control pattern based on Qualifications, pattern that we called "QBAC" (Qualifications Based Access Control). Acesta...

  • A Brief Introduction to Usable Security. Payne, Bryan D.; Edwards, W. Keith // IEEE Internet Computing;May-Jun2008, Vol. 12 Issue 3, p13 

    Researchers have studied usable computer security for more than 20 years, and developers have created numerous security interfaces. Here, the authors examine research in this space, starting with a historical look at papers that address two consistent problems: user authentication and email...

  • BIOHOME: An Accessible House Designed for Assisted Living. Zapirain, Begoña García; Sáez, Javier Vicente; Zorrilla, Amaia Méndez; Oleagordia, Ibon Ruiz // Computer Technology & Application;2011, Vol. 2 Issue 2, p117 

    This project describes an integral solution to implement a module-based platform for the control of all the automated systems inside a house and a remote control of the entrance access to this house. A biometrical access based on the hand veins has been used with a complete local and remote...

  • Design and Implementation of Secure Xenix. Gligor, Virgil D.; Chandersekaran, C.S.; Chapman, Robert S.; Dotterer, Leslie J.; Hecht, Matthew S.; Wen-Der Jiang; Johri, Abhai; Luckenbaugh, Gary L.; Vasudevan, N. // IEEE Transactions on Software Engineering;Feb87, Vol. 13 Issue 2, p208 

    Secure Xenixâ„¢ is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, ills a Unixâ„¢ System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the...

  • From ABAC to ZBAC: The Evolution of Access Control Models. Karp, Alan; Haury, Harry; Davis, Michael // Proceedings of the International Conference on Information Warfa;2010, p202 

    Several attempts at using the Services Oriented Architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the authentication of the requester, have been found to be inflexible, don't scale well, and are difficult to...

  • A Novel Approach Share Key Refreshing for Long Term Protection in Distributed Cryptography by Proactive Security. Retoliya, Rajkumari; Tripathi, Anshu // International Journal of Computer Science Engineering & Technolo;Jul2011, Vol. 1 Issue 6, p290 

    Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics