Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, W [1 ]
Haas, I [1 ]
机构
[1] Siemens AG, Corp Technol Secur Technol, D-81730 Munich, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has become an issue of critical importance; the potentially huge moves towards a Global Information Infrastructure and electronic commerce heavily depend on the security issues being resolved. Before the GII and electronic commerce obtain widespread use and general acceptance, confidence is required that the security techniques being employed are sufficient to guarantee the effective protection of the information transmitted processed and stored. In this contribution, the authors look at the GII security requirements, the needs for security standardization, the work underway and the tasks ahead.
引用
收藏
页码:3141 / 3146
页数:6
相关论文
共 50 条
  • [1] GLOBAL INFORMATION INFRASTRUCTURE
    LINDBERG, DAB
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 34 (1-4): : 13 - 19
  • [2] Homeland security & infrastructure information
    Walker, DE
    [J]. ASHRAE JOURNAL, 2004, 46 (05) : 61 - 61
  • [3] Realization of Global Information Infrastructure
    Chec, Jolanta
    [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 523 - 526
  • [4] Financing the global information infrastructure
    Olmer, LH
    [J]. PTC '96 - 18TH ANNUAL PACIFIC TELECOMMUNICATIONS CONFERENCE, PROCEEDINGS, VOLS I AND II, 1996, : 984 - 990
  • [5] The global information infrastructure revisited
    James, J
    [J]. THIRD WORLD QUARTERLY, 2001, 22 (05) : 813 - 822
  • [6] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [7] INFORMATION SECURITY MANAGEMENT FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A. V.
    Lvovich, I. Ya.
    Shikhaliev, M. S.
    Zelenina, A. N.
    Choporov, O. N.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (03): : 91 - 100
  • [8] Managing Security of Critical Information Infrastructure
    Erokhin, S. D.
    [J]. 2019 SYSTEMS OF SIGNAL SYNCHRONIZATION, GENERATING AND PROCESSING IN TELECOMMUNICATIONS (SYNCHROINFO), 2019,
  • [9] Measuring the information security risk in an infrastructure
    Leitold, Ferenc
    Hadarics, Kalman
    Oroszi, Eszter
    Gyorffy, Krisztina
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 93 - 100
  • [10] Evolving Global Information Infrastructure and Information Transfer
    Guinn, Richard Lee
    [J]. JOURNAL OF ACADEMIC LIBRARIANSHIP, 2015, 41 (05): : 705 - 705