Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, W [1 ]
Haas, I [1 ]
机构
[1] Siemens AG, Corp Technol Secur Technol, D-81730 Munich, Germany
来源
GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION | 1998年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has become an issue of critical importance; the potentially huge moves towards a Global Information Infrastructure and electronic commerce heavily depend on the security issues being resolved. Before the GII and electronic commerce obtain widespread use and general acceptance, confidence is required that the security techniques being employed are sufficient to guarantee the effective protection of the information transmitted processed and stored. In this contribution, the authors look at the GII security requirements, the needs for security standardization, the work underway and the tasks ahead.
引用
收藏
页码:3141 / 3146
页数:6
相关论文
共 50 条
  • [41] Enabling software capabilities for the Global Information Infrastructure
    Wolff, RS
    PTC '96 - 18TH ANNUAL PACIFIC TELECOMMUNICATIONS CONFERENCE, PROCEEDINGS, VOLS I AND II, 1996, : 904 - 911
  • [42] Global information infrastructure: The birth, vision, and architecture
    Mon, L
    GOVERNMENT INFORMATION QUARTERLY, 2000, 17 (04) : 458 - 459
  • [43] From Gutenberg to the global information infrastructure.
    Dillon, A
    PUBLISHING RESEARCH QUARTERLY, 2002, 17 (04) : 59 - 60
  • [44] Planning global information infrastructure - Chen,CC
    Chapman, B
    GOVERNMENT INFORMATION QUARTERLY, 1997, 14 (01) : 108 - 108
  • [45] Security information and event management in the cloud computing infrastructure
    Pavlik, Jakub
    Komarek, Ales
    Sobeslav, Vladimir
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 209 - 214
  • [46] The state of information infrastructure for global climate governance
    Engvall, Tove Sofia
    Flak, Leif Skiftenes
    TRANSFORMING GOVERNMENT- PEOPLE PROCESS AND POLICY, 2022, 16 (04) : 436 - 448
  • [47] Towards the Trustable Global Information Logistics Infrastructure
    Yamamura, Shinya
    Nagata, Akira
    Tsuru, Masato
    PROCEEDINGS OF THE 6TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '11), 2011, : 71 - 72
  • [48] The Impact Assessment of IT Infrastructure on Information Security: A Survey Report
    Shrivastava, Ankur Kumar
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 314 - 322
  • [49] The deployment of security information and event management in cloud infrastructure
    Holik, Filip
    Horalek, Josef
    Neradova, Sona
    Zitta, Stanislav
    Marik, Ondrej
    2015 25TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2015, : 399 - 404
  • [50] Encryption and the global information infrastructure: An Australian perspective
    Orlowski, S
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 65 - 74