๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Requirements for a secure terminal switch

โœ Scribed by Arthur Sorkin


Publisher
Elsevier Science
Year
1983
Tongue
English
Weight
556 KB
Volume
2
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Business requirements for secure electro
โœ Pieter van Dijken ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 737 KB

This article presents the experience gained over many years by Shell in the use of electronic business communications which have resulted in carefully developed strategies for maintaining control and security of sensitive electronic messages. These ideas include accreditation and certification schem

Software requirements and architecture m
โœ Michael E. Shin; Hassan Gomaa ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 884 KB

This paper describes an approach to modeling the evolution of non-secure applications into secure applications in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security s

Security requirements for voice messagin
โœ Gerald Kovacich ๐Ÿ“‚ Article ๐Ÿ“… 1995 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 471 KB

883 8721, Offers both standard and custom Kerberos implementations for system back-end identification. diskette based ID system and InfoCard is a physical token device for user with their remote access control servers.

Holistic security requirement engineerin
โœ Albin Zuccato ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 389 KB

With the introduction of electronic commerce, business is becoming dependent on information systems in a new way. Information security is thus becoming more and more important to companies' self-protection. In contrast to previous systems, this is also directly visible to the customer. The changing