SECURITY CONSIDERATIONS IN A NETWORK MANAGEMENT ENVIRONMENT

被引:1
|
作者
OMAHONY, D
机构
来源
IEEE NETWORK | 1994年 / 8卷 / 03期
关键词
D O I
10.1109/65.283929
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
下载
收藏
页码:12 / 17
页数:6
相关论文
共 50 条
  • [1] INTEGRITY AND SECURITY CONSIDERATIONS IN A NETWORK ENVIRONMENT
    SLACK, JM
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1993, 206 : 45 - CINF
  • [2] Security Considerations in OpenTag Network
    Farhadi, Hamid
    Furuhashi, Ryoji
    Nakao, Akihiro
    2014 26TH INTERNATIONAL TELETRAFFIC CONGRESS (ITC), 2014,
  • [3] A Study on Security Management Service System for Wireless Network Environment
    Lee, Daeseob
    Won, Dongho
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 : 209 - 220
  • [4] Public Safety Network Security Considerations
    McGee, Andrew R.
    Coutiere, Matthieu
    Palamara, Maria E.
    BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 79 - 86
  • [5] Considerations on security model of home network
    Kim, GW
    Kim, DW
    Lee, JH
    Hwang, JB
    Han, JW
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U109 - U112
  • [6] NETWORK SECURITY IN A HETEROGENEOUS ENVIRONMENT
    SHARP, RL
    EISEN, SR
    KLEPPINGER, WE
    SMITH, ME
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 52 - 60
  • [7] Security vulnerability and considerations in mobile RFID environment
    Kim, J
    Kim, H
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U801 - U804
  • [8] Security considerations in the distributed parallel computation environment
    Chien, SY
    Giavelli, L
    Ecer, A
    Akay, HU
    Parallel Computational Fluid Dynamics: Multidisciplinary Applications, 2005, : 395 - 402
  • [9] CONSIDERATIONS ON THE PHASES OF THE MANAGEMENT OF THE SECURITY INCIDENTS
    Tudor, Remus-Ion
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MANAGEMENT, CONFERENCE PROCEEDINGS 2, 2009, 2 : 166 - 170
  • [10] A network security policy self-adaptive management and distribution model in complex network environment
    Tang, Chenghua
    Yu, Shunzheng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 832 - 837