How CDSA ties security together

Songini, Marc
June 1999
Network World;06/07/99, Vol. 16 Issue 23, p44
Trade Publication
Focuses on Open Group's software framework, the Common Data Security Architecture. Interoperability between various security tools; Key-recovery mechanism added.


Related Articles

  • Intel moves to open CDSA source code. Berinato, Scott // PC Week;04/10/2000, Vol. 17 Issue 15, p10 

    Reports on the introduction of Intel Corp.'s common data security architecture (CDSA) security software. Code base made under Intel's own BSD-like license; Availability of Windows and Linux codes of the CDSA; Launching of a code-compliance program.

  • Understanding Data Governance and Stewardship, Part 1. Marco, David // DM Review;Sep2006, Vol. 16 Issue 9, p28 

    The article provides information on the processes of data governance and stewardship. The relevance of data governance to an organization include understanding of common data quality, improvement of data accuracy, consolidation of redundancy in common data and the identification of costs. The...

  • Status and Trend of Foreign Military Data Link for Unmanned Aerial Vehicles. LI Gui-hua // Telecommunication Engineering;Jun2014, Vol. 54 Issue 6, p851 

    The data link is an important component of unmanned aerial vehicle(UAV), connecting UAV to ground system. First, the UAVs are classified according to fligh height and payload. Based on that, the current status of foreign military UAV data link is summarized. Secondly, some typical UAV data links...

  • A Self-healing Connectivity Recovery Algorithm in Wireless Sensor- Actor Networks. Lei Yao; Dongdong Xu; Jie Zhou; Jinglin Du // Applied Mechanics & Materials;2014, Issue 668-669, p1219 

    Wireless sensor and actor networks (WSANs) additionally employ actor nodes within the wireless sensor network (WSN) which can process the sensed data and perform certain actions based on this collected data. In most applications, inter-actor coordination is required to provide the best response....

  • CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS. Ristov, Sasko; Gusev, Marjan; Kostoska, Magdalena // International Journal of Network Security & Its Applications;Mar2012, Vol. 4 Issue 2, p75 

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish...

  • A 5-Level Security Approach for Data Storage in Cloud. Kotiyal, Bina; Saxena, Priti; Goudar, R. H.; Jogdand, Rashmi M. // International Journal of Computer Applications;09/15/2012, Vol. 54, p29 

    Everyone in the IT world is bustling with the cloud computing concept. Conversing about the catchphrase cloud, the terms like virtualization, resources, elasticity, security, pay per use basis hit the mind. A key stumbling block of motivating the IT sector towards cloud ethnicity is the lack of...

  • An Operational Framework for Alert Correlation using a Novel Clustering Approach. Mohamed, Ashara Banu; Idris, Norbik Bashah; Shanmugum, Bharanidharan // International Journal of Computer Applications;09/15/2012, Vol. 54, p23 

    Intrusion Detection System (IDS) is a well known security feature and widely implemented among practitioners. However, since the creation of IDS the enormous number of alerts generated by the detection sensors has always been a setback in the implementation environment. Moreover due to this...

  • Open Group sets 'Net security standards. Leon, Mark // InfoWorld;5/13/96, Vol. 18 Issue 20, p20 

    Reports that Open Group, an organization created by the merger of X/Open Company Limited and Open Software Foundation's Internet, has introduced its first in a security series of security standards. What a secure communications services specification defines; Comments from Dean Adams, the Open...

  • OPEN GROUP DEBUTS TEST COVERAGE FOR SINGLE UNIX SPEC VER. 3.  // UNIX Update;Mar2003, Vol. 14 Issue 3, p8 

    Announces the complete test coverage for the Single UNIX Specification Version 3 computer software introduced by the Open Group in 2003.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics