Requirements for a secure terminal switch
โ Scribed by Arthur Sorkin
- Publisher
- Elsevier Science
- Year
- 1983
- Tongue
- English
- Weight
- 556 KB
- Volume
- 2
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This article presents the experience gained over many years by Shell in the use of electronic business communications which have resulted in carefully developed strategies for maintaining control and security of sensitive electronic messages. These ideas include accreditation and certification schem
This paper describes an approach to modeling the evolution of non-secure applications into secure applications in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security s
883 8721, Offers both standard and custom Kerberos implementations for system back-end identification. diskette based ID system and InfoCard is a physical token device for user with their remote access control servers.
With the introduction of electronic commerce, business is becoming dependent on information systems in a new way. Information security is thus becoming more and more important to companies' self-protection. In contrast to previous systems, this is also directly visible to the customer. The changing