Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, W [1 ]
Haas, I [1 ]
机构
[1] Siemens AG, Corp Technol Secur Technol, D-81730 Munich, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has become an issue of critical importance; the potentially huge moves towards a Global Information Infrastructure and electronic commerce heavily depend on the security issues being resolved. Before the GII and electronic commerce obtain widespread use and general acceptance, confidence is required that the security techniques being employed are sufficient to guarantee the effective protection of the information transmitted processed and stored. In this contribution, the authors look at the GII security requirements, the needs for security standardization, the work underway and the tasks ahead.
引用
收藏
页码:3141 / 3146
页数:6
相关论文
共 50 条
  • [21] Interacting with databases in the global information infrastructure
    Catarci, T
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1997, 35 (05) : 72 - 76
  • [22] Rescue infrastructure for global information collection
    Asama, Hajime
    Hada, Yasushi
    Kawabata, Kuniaki
    Noda, Itsuki
    Takizawa, Osamu
    Meguro, Junichi
    Ishikawa, Kiichiro
    Hashizume, Takumi
    Ohga, Tomowo
    Hatayama, Michinori
    Matsuno, Fumitoshi
    Todokoro, Satoshi
    [J]. 2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 1600 - +
  • [23] Special issue on global information infrastructure
    Goode, B
    [J]. PROCEEDINGS OF THE IEEE, 1997, 85 (12) : 1883 - 1886
  • [24] TECHNICAL COMMITTEES AND THE GLOBAL INFORMATION INFRASTRUCTURE
    DECINA, M
    WEINSTEIN, SB
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (05) : 4 - 4
  • [25] Design infrastructure of security system in medical information
    Chen, XM
    Zhang, JG
    [J]. JOURNAL OF INFRARED AND MILLIMETER WAVES, 2005, 24 (01) : 71 - 75
  • [26] INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A., V
    Kravets, O. Ja
    Choporov, O. N.
    Zelenina, A. N.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 67 - 76
  • [27] A CBK for Information Security and Critical Information and Communication Infrastructure Protection
    Theoharidou, Marianthi
    Xidara, Dimitra
    Gritzalis, Dimitris
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 81 - 96
  • [28] Global Information Security Factors
    White, Garry
    Long, Ju
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 49 - 60
  • [29] Influence of Established Information Security Governance and Infrastructure on Future Security Certifications
    Sedinic, Ivan
    Lovric, Zrinka
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1111 - 1115
  • [30] Behaviour analysis techniques for supporting critical infrastructure security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 267 - 287