Schweitzer, 1985 - Google Patents
A management view: computer security as a discretionary decisionSchweitzer, 1985
- Document ID
- 11767114468895510250
- Author
- Schweitzer J
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
The security manager needs to have an understanding of the management view of information as a resource. There are five understandings necessary if the security manager is to be seen as a part of management rather than as a necessary evil. These …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8381287B2 (en) | Trusted records using secure exchange | |
Hu et al. | Assessment of access control systems | |
US8402281B2 (en) | Data security system for a database | |
US7827598B2 (en) | Grouped access control list actions | |
Gollman | Computer security | |
US6981141B1 (en) | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files | |
Krutz et al. | The CISSP Prep Guide: Gold Edition | |
US20060200664A1 (en) | System and method for securing information accessible using a plurality of software applications | |
US20050114672A1 (en) | Data rights management of digital information in a portable software permission wrapper | |
Longley | Data security | |
US20190272386A1 (en) | Method of Integrating an Organizational Security System | |
CN109684854B (en) | A low-level data encryption method suitable for enterprise management information system | |
WO2001082092A1 (en) | Secure system access | |
US20050044366A1 (en) | Method for making databases secure | |
Summers | An overview of computer security | |
Schweitzer | A management view: computer security as a discretionary decision | |
US10970408B2 (en) | Method for securing a digital document | |
Murray | Security considerations for personal computers | |
Lincke | Designing Information Security | |
Symons et al. | A proposal for an automated logical access control standard (ALACS) a standard for computer logical access security | |
Wood | Administrative controls for password-based computer access control systems | |
Gebhardt et al. | Enabling technologies for role based online decision engines | |
Huston et al. | Security in the management of information systems | |
Everette | Examination of the Internet Message Access Protocol (IMAP) to facilitate user-friendly multilevel email management | |
Van Rooyen | Evaluation of Access Control Within the Millennium Software Package |