𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Identity infrastructure: security considerations

✍ Scribed by Richard Walton CB


Book ID
114390325
Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
289 KB
Volume
2005
Category
Article
ISSN
1361-3723

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Network infrastructure security
✍ Lesley Hansen πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 628 KB
Identity and Security
✍ Bellovin, S.M. πŸ“‚ Article πŸ“… 2010 πŸ› IEEE 🌐 English βš– 177 KB
Resilient infrastructure for network sec
✍ Matthew M. Williamson πŸ“‚ Article πŸ“… 2003 πŸ› John Wiley and Sons 🌐 English βš– 198 KB

## Abstract Present‐day network security mechanisms are based on preventing attacks and responding to them as they occur. In the time before a response is implemented the attack is generally free to damage the system. Because responses are usually human driven, this time is long and the damage can

Safe and Secure Infrastructure Upgrades
✍ Bruce Potter πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 70 KB

On the flip side, attackers are continually shrinking the time between the discovery of a vulnerability and the release of attacks that target that vulnerability. In 2001, the Nimda worm was released five months after the announcement of the vulnerability it exploited. In 2003, Blaster was released