Barker et al., 1988 - Google Patents
Security standards—Government and commercialBarker et al., 1988
- Document ID
- 13667536474837987898
- Author
- Barker L
- Nelson L
- Publication year
- Publication venue
- AT&T technical journal
External Links
Snippet
Computer security standards are needed to reduce the cost of security products and to allow for interoperability and evaluation. Several national and international groups are trying to standardize approaches to information security for certain applications. This paper describes …
- 230000000694 effects 0 abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferraiolo et al. | Role-based access control | |
Ives et al. | The domino effect of password reuse | |
TW314609B (en) | ||
US20110289322A1 (en) | Protected use of identity identifier objects | |
US20040088560A1 (en) | Secure system access | |
Longley | Data security | |
National Research Council | Cryptography's Role in Securing the Information Society | |
Barker et al. | Security standards—Government and commercial | |
Pfleeger et al. | Security and privacy: Promising advances | |
Lee et al. | A study on a smart city supply chain security model based on zero-trust | |
Michener | System insecurity in the Internet age | |
Pons | Benchmark of Decentralised Identifier and Identity Terms for Harmonising Blockchain and Distributed Ledger Technology and Identification Standards. 15 | |
Ivan et al. | Security of Collaborative Banking Systems | |
Fulkerson et al. | Database security | |
Lowman et al. | Applying the DoD Goal Security Architecture as a methodology for the development of system and enterprise security architectures | |
Ivan et al. | Security Aspects of Collaborative Banking Systems Applied in Economy | |
Leiby et al. | Security issues on the Internet | |
Radack et al. | Security in open systems networks | |
Profet et al. | The risk of trust vs. the cost of assurance/spl minus/trades in the implementation of a secure LAN | |
Weller et al. | Introduction to the New Mainframe: Security | |
Ekebrink | Data security in terminalized system | |
Herrigel et al. | ECMA's Approach for IT Security Evaluations | |
Paulus | E-business: Building security on trust | |
Adams | Open for business—Securely! | |
Merrill et al. | Requirements for a true enterprise-wide security infrastructure: the play's the thing |