Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, W [1 ]
Haas, I [1 ]
机构
[1] Siemens AG, Corp Technol Secur Technol, D-81730 Munich, Germany
来源
GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION | 1998年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has become an issue of critical importance; the potentially huge moves towards a Global Information Infrastructure and electronic commerce heavily depend on the security issues being resolved. Before the GII and electronic commerce obtain widespread use and general acceptance, confidence is required that the security techniques being employed are sufficient to guarantee the effective protection of the information transmitted processed and stored. In this contribution, the authors look at the GII security requirements, the needs for security standardization, the work underway and the tasks ahead.
引用
收藏
页码:3141 / 3146
页数:6
相关论文
共 50 条
  • [31] How to respond to the global information infrastructure
    Jires, S
    POLITICKA EKONOMIE, 2002, 50 (02) : 297 - 299
  • [32] Global information infrastructure: first principles
    Graf II, James E.
    Telecommunications (Americas Edition), 1995, 29 (01): : 72 - 73
  • [33] INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A., V
    Kravets, O. Ja
    Choporov, O. N.
    Zelenina, A. N.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 67 - 76
  • [34] Global Information Security Factors
    White, Garry
    Long, Ju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 49 - 60
  • [35] Influence of Established Information Security Governance and Infrastructure on Future Security Certifications
    Sedinic, Ivan
    Lovric, Zrinka
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1111 - 1115
  • [36] Behaviour analysis techniques for supporting critical infrastructure security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 267 - 287
  • [37] INFORMATION SECURITY IN THE AIRCRAFT ACCESS TO SYSTEM WIDE INFORMATION MANAGEMENT INFRASTRUCTURE
    Moallemi, Mohammad
    Castro-Pena, Carlos A.
    Towhidnejad, Massood
    Abraham, Biruk
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [38] Borders in cyberspace: Information policy and the global information infrastructure.
    Warner, J
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1998, 49 (04): : 387 - 388
  • [39] Network evolution in the context of the global information infrastructure
    Lu, HL
    Faynberg, I
    Toubassi, A
    Lucas, F
    Renon, F
    IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (08) : 98 - 102
  • [40] Applications and techniques in information and network security
    Abawajy, Jemal H.
    Islam, Rafiqul
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)