TITLE

Making Informtaion Flow Seamlessly but Securely

AUTHOR(S)
Blum, Daniel
PUB. DATE
March 1999
SOURCE
Network World;03/29/99, Vol. 16 Issue 13, p39
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Deals with the importance of making the flow of internal and external information service (IS) system secure. Benefit offered by public key infrastructure and PKI-based protocols; Implementation of Kerberos, an authentication protocol.
ACCESSION #
2593392

 

Related Articles

  • Information Security Modeling for the Operation of a Novel Highly Trusted Network in a Virtualization Environment. Chang, Jung-Sook; Jeon, Yong-Hee; Sim, Sohyun; Kang, An Na // International Journal of Distributed Sensor Networks;9/27/2015, Vol. 2015, p1 

    A novel network architecture to be deployed in Korea is so called HTN (highly trusted network). The aim of HTN is the seamless communication of information in a secure manner, anytime and anywhere, in the national administration network infrastructure. In this paper, we present the results of...

  • Research on Application of Computer Technology in Accounting Practice Teaching System. Jiamin Fang; Xianzhen Meng // Advanced Materials Research;2014, Issue 926-930, p4557 

    The prevalence and application of IT technology in accounting information system promotes the development of accounting information system in networking aspect. On one hand, the network-based accounting information system promotes the diversification of accounting information processing,...

  • Research on Security Issues of the Internet of Things. Xiaofeng Wang // Advanced Materials Research;7/24/2014, Vol. 989-994, p4261 

    According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference...

  • Principles of remote attestation. Coker, George; Guttman, Joshua; Loscocco, Peter; Herzog, Amy; Millen, Jonathan; O'Hanlon, Brian; Ramsdell, John; Segall, Ariel; Sheehy, Justin; Sniffen, Brian // International Journal of Information Security;Jun2011, Vol. 10 Issue 2, p63 

    Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guide development of attestation systems. We argue that (i) attestation must be able to deliver temporally fresh...

  • Design of an Immune based Network Intrusion Detection System. Lei Liu; Xingwei Liu; Zhenhua Qin; Jing Ma // Journal of Computer Science & Control Systems;2010, Vol. 3 Issue 1, p103 

    An immune algorithm combined intrusion detection system (IDS) can effectively detect viruses in networks. In this paper, the architecture of an immune based network intrusion detection system is introduced, which is a distributed system by using several intrusion detectors in different local...

  • An Integrated Electricity Information Security Monitoring Platform. Ran Yu; Jiaojiao Zhang; Hongfei Xu; Shen Jin // Applied Mechanics & Materials;2014, Vol. 701/702, p947 

    An integrated electricity information security monitoring platform is presented, electrical information security integrated real-time monitoring of the state power applied information security systems, security equipment, network equipment, network boundaries, desktop computers, to improve...

  • CORRECTION:.  // Information Security;Sep2007, Vol. 10 Issue 8, p10 

    A correction to the article "Stormy Weather" that was published in the July/August 2007 issue is presented.

  • How to protect your firm - and your clients - from cyberattacks. Beauchamp, Parker // PRWeek (U.S. Edition);Feb2015, Vol. 18 Issue 2, p22 

    The article offers the author's perspective on how to protect one's company and its clients from cyberattacks, citing security as the top of mind after the high-profile cyberattacks in 2014.

  • THIS MONTH'S ROUNDUP OF HITS AND MISSES.  // Event Marketer Magazine;Aug2014, p25 

    The article offers information on topics including the Infosecurity Europe, information security product show, held from April 29-May 1, 2014, the Zombie Walk at Comic-Con San Diego activity in California, and the GoPro footage of Devin Super Tramp, YouTube star, with his team "Urban Surfing."

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics