Security management system functional architecture for enterprise network

نویسنده

  • Shervin Erfani
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bringing Security Proactively Into the Enterprise

Prevailing network architectures are designed for openness, collaboration, and sharing. The majority of viruses and worms use the network to spread rapidly through the enterprise network, enabling these cyber threats to reach their targets effortlessly. The most common solution available today for cyber security is hardening of systems via “patching” or keeping the operating systems, applicatio...

متن کامل

Providing an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach

Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems.  Materials and Methods: This study was a ...

متن کامل

Using Enterprise Architecture Framework to Design Network Security Architecture

-In the recent years, Information Technology (IT) has come to play an important, and often vital, role in almost all aspects of the life and so there is a growing role and importance for the enterprise architecture (EA) in the management of the organizations. Network security architecture, which can be referred as a comprehensive description of all of the key elements and relationships that mak...

متن کامل

A privacy architecture for context-aware enterprise social networks

Context information is used to derive user profiles and social networks in an enterprise system called Instant Knowledge. This system requires privacy as well as conventional information security requirements. The privacy requirements include anonymity, unlinkability, unobservability and pseudonymity; these are designed to provide privacy by default to users of an Instant Knowledge service. A p...

متن کامل

A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting

Providing network infrastructure for authenti-cation, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over the global Internet is a challenging problem. The infrastructure needs to support large numbers of clients and services, and also to provide secure resources sharing between applications and across organizations. This paper de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000