[go: up one dir, main page]

Barker et al., 1988 - Google Patents

Security standards—Government and commercial

Barker et al., 1988

Document ID
13667536474837987898
Author
Barker L
Nelson L
Publication year
Publication venue
AT&T technical journal

External Links

Snippet

Computer security standards are needed to reduce the cost of security products and to allow for interoperability and evaluation. Several national and international groups are trying to standardize approaches to information security for certain applications. This paper describes …
Continue reading at onlinelibrary.wiley.com (other versions)

Similar Documents

Publication Publication Date Title
Ferraiolo et al. Role-based access control
Ives et al. The domino effect of password reuse
TW314609B (en)
US20110289322A1 (en) Protected use of identity identifier objects
US20040088560A1 (en) Secure system access
Longley Data security
National Research Council Cryptography's Role in Securing the Information Society
Barker et al. Security standards—Government and commercial
Pfleeger et al. Security and privacy: Promising advances
Lee et al. A study on a smart city supply chain security model based on zero-trust
Michener System insecurity in the Internet age
Pons Benchmark of Decentralised Identifier and Identity Terms for Harmonising Blockchain and Distributed Ledger Technology and Identification Standards. 15
Ivan et al. Security of Collaborative Banking Systems
Fulkerson et al. Database security
Lowman et al. Applying the DoD Goal Security Architecture as a methodology for the development of system and enterprise security architectures
Ivan et al. Security Aspects of Collaborative Banking Systems Applied in Economy
Leiby et al. Security issues on the Internet
Radack et al. Security in open systems networks
Profet et al. The risk of trust vs. the cost of assurance/spl minus/trades in the implementation of a secure LAN
Weller et al. Introduction to the New Mainframe: Security
Ekebrink Data security in terminalized system
Herrigel et al. ECMA's Approach for IT Security Evaluations
Paulus E-business: Building security on trust
Adams Open for business—Securely!
Merrill et al. Requirements for a true enterprise-wide security infrastructure: the play's the thing