Security in Open and Distributed Systems
نویسنده
چکیده
Users who downloaded this article also downloaded: Mariana Gerber, Rossouw von Solms, Paul Overbeek, (2001),"Formalizing information security requirements", Information Management & Computer Security, Vol. 9 Iss 1 pp. 32-37 Dieter Fink, (1994),"A Security Framework for Information Systems Outsourcing", Information Management & Computer Security, Vol. 2 Iss 4 pp. 3-8 Kevin J. Fitzgerald, (1995),"Security and data integrity for LANs and WANs", Information Management & Computer Security, Vol. 3 Iss 4 pp. 27-33
منابع مشابه
Distributed Generation Effects on Unbalanced Distribution Network Losses Considering Cost and Security Indices
Due to the increasing interest on renewable sources in recent years, the studies on integration of distributed generation to the power grid have rapidly increased. In order to minimize line losses of power systems, it is crucially important to define the size and location of local generation to be placed. Minimizing the losses in the system would bring two types of saving, in real life, one is ...
متن کاملDistributed Generation Effects on Unbalanced Distribution Network Losses Considering Cost and Security Indices
Due to the increasing interest on renewable sources in recent years, the studies on integration of distributed generation to the power grid have rapidly increased. In order to minimize line losses of power systems, it is crucially important to define the size and location of local generation to be placed. Minimizing the losses in the system would bring two types of saving, in real life, one is ...
متن کاملStudying Dynamic behavior of Distributed Parameter Processes Behavior Based on Dominant Gain Concept and it’s Use in Controlling these Processes
In this paper, distributed parameter process systems behavior is studied in frequency domain. Based on the dominant gain concept that is developed for such studies, a method is presented to control distributed parameter process systems. By using dominant gain concept, the location of open loop zeros, resulted from the time delay parameter in the process model, were changed from the right half p...
متن کاملDistributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملOpenPMF: Using Open Source for Security Policy Integration and Intrusion Detection in Heterogeneous Distributed IT Systems
Most organisations today need to maintain and periodically migrate a heterogeneous distributed IT infrastructure to more modern platforms. This is typically a time-consuming, expensive, and error-prone process. The same problem also applies to IT security – security technologies and policy management consoles are changed periodically. We use software modelling concepts to ease the maintenance a...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 2 شماره
صفحات -
تاریخ انتشار 1994