Security centric systems for information technology

被引:0
|
作者
Tezuka, Satoru [1 ]
Mitsunaga, Satoshi [2 ]
Nakagami, Shoichi [3 ]
Kitajima, Hiroyuki [4 ]
机构
[1] Hitachi, Ltd., Systems Development Laboratory
[2] Hitachi, Ltd., Information Systems Division
[3] Hitachi, Ltd., Govt./Pub. Corp. Info. Syst. Div.
[4] Hitachi, Ltd., Electron. Business Services Division
来源
Hitachi Review | 1999年 / 48卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:187 / 191
相关论文
共 50 条
  • [1] A taxonomy of information security for service-centric systems
    Savolainen, Pekka
    Niemela, Eila
    Savola, Reijo
    [J]. SEAA 2007: 33RD EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, PROCEEDINGS, 2007, : 5 - +
  • [2] User-Centric Information Security Systems - A Living lab Approach
    Dlamini, Moses
    Eloff, Jan
    Zielinksi, Marek
    Chuang, Jason
    Smit, Danie
    [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 73 - 80
  • [3] INFORMATION-CENTRIC NETWORKING SECURITY
    Fu, Xiaoming
    Kutscher, Dirk
    Misra, Satyajayant
    Li, Ruidong
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) : 60 - 61
  • [4] Knowledge-Centric Information Security
    Fung, Walter S. L.
    Fung, Richard Y. K.
    [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 27 - +
  • [5] An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
    Staves, Alexander
    Gouglidis, Antonios
    Hutchison, David
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [6] Portal technology for integrated, user-centric university information systems
    Bajec, M
    Mahnic, V
    Krisper, M
    [J]. MANAGEMENT OF EDUCATION IN THE INFORMATION AGE: THE ROLE OF ICT, 2003, 120 : 93 - 101
  • [7] A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
    Sengupta, Anirban
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 57 - 73
  • [8] Beyond individual-centric privacy: Information technology in social systems
    Pieters, Wolter
    [J]. INFORMATION SOCIETY, 2017, 33 (05): : 271 - 281
  • [9] Information Systems Security and Its Affiliation to Information Technology Risk Management
    Jahankhani, Hamid
    Nkhoma, Mathews
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 195 - +
  • [10] A requirement centric framework for information security evaluation
    Savola, Reijo
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 48 - 59