[go: up one dir, main page]

Schweitzer, 1985 - Google Patents

A management view: computer security as a discretionary decision

Schweitzer, 1985

Document ID
11767114468895510250
Author
Schweitzer J
Publication year
Publication venue
Computers & Security

External Links

Snippet

The security manager needs to have an understanding of the management view of information as a resource. There are five understandings necessary if the security manager is to be seen as a part of management rather than as a necessary evil. These …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
US8381287B2 (en) Trusted records using secure exchange
Hu et al. Assessment of access control systems
US8402281B2 (en) Data security system for a database
US7827598B2 (en) Grouped access control list actions
Gollman Computer security
US6981141B1 (en) Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
Krutz et al. The CISSP Prep Guide: Gold Edition
US20060200664A1 (en) System and method for securing information accessible using a plurality of software applications
US20050114672A1 (en) Data rights management of digital information in a portable software permission wrapper
Longley Data security
US20190272386A1 (en) Method of Integrating an Organizational Security System
CN109684854B (en) A low-level data encryption method suitable for enterprise management information system
WO2001082092A1 (en) Secure system access
US20050044366A1 (en) Method for making databases secure
Summers An overview of computer security
Schweitzer A management view: computer security as a discretionary decision
US10970408B2 (en) Method for securing a digital document
Murray Security considerations for personal computers
Lincke Designing Information Security
Symons et al. A proposal for an automated logical access control standard (ALACS) a standard for computer logical access security
Wood Administrative controls for password-based computer access control systems
Gebhardt et al. Enabling technologies for role based online decision engines
Huston et al. Security in the management of information systems
Everette Examination of the Internet Message Access Protocol (IMAP) to facilitate user-friendly multilevel email management
Van Rooyen Evaluation of Access Control Within the Millennium Software Package