Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, W [1 ]
Haas, I [1 ]
机构
[1] Siemens AG, Corp Technol Secur Technol, D-81730 Munich, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has become an issue of critical importance; the potentially huge moves towards a Global Information Infrastructure and electronic commerce heavily depend on the security issues being resolved. Before the GII and electronic commerce obtain widespread use and general acceptance, confidence is required that the security techniques being employed are sufficient to guarantee the effective protection of the information transmitted processed and stored. In this contribution, the authors look at the GII security requirements, the needs for security standardization, the work underway and the tasks ahead.
引用
收藏
页码:3141 / 3146
页数:6
相关论文
共 50 条
  • [31] INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A., V
    Kravets, O. Ja
    Choporov, O. N.
    Zelenina, A. N.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 67 - 76
  • [32] Design infrastructure of security system in medical information
    Chen, XM
    Zhang, JG
    JOURNAL OF INFRARED AND MILLIMETER WAVES, 2005, 24 (01) : 71 - 75
  • [33] A CBK for Information Security and Critical Information and Communication Infrastructure Protection
    Theoharidou, Marianthi
    Xidara, Dimitra
    Gritzalis, Dimitris
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 81 - 96
  • [34] Global Information Security Factors
    White, Garry
    Long, Ju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 49 - 60
  • [35] Influence of Established Information Security Governance and Infrastructure on Future Security Certifications
    Sedinic, Ivan
    Lovric, Zrinka
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1111 - 1115
  • [36] Behaviour analysis techniques for supporting critical infrastructure security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 267 - 287
  • [37] INFORMATION SECURITY IN THE AIRCRAFT ACCESS TO SYSTEM WIDE INFORMATION MANAGEMENT INFRASTRUCTURE
    Moallemi, Mohammad
    Castro-Pena, Carlos A.
    Towhidnejad, Massood
    Abraham, Biruk
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [38] Borders in cyberspace: Information policy and the global information infrastructure.
    Warner, J
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1998, 49 (04): : 387 - 388
  • [39] INFORMATION TECHNOLOGY - SECURITY TECHNIQUES AND STANDARDIZATION
    KRAUSE, L
    COMPUTER STANDARDS & INTERFACES, 1995, 17 (01) : 63 - 67
  • [40] Computer graphics and visualization in the global information infrastructure
    Gershon, N
    Brown, JR
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1996, 16 (02) : 60 - 61