HARDWARE AND NETWORK CONFIGURATION - ASSURANCE OF RELIABILITY AND SECURITY

被引:0
|
作者
HAGA, M
机构
来源
NTT REVIEW | 1994年 / 6卷 / 06期
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
CUSTOM is a giant system, and one of the few online systems in the world to link multivendor computers. Between 25,000 and 30,000 terminals are connected to this network. Since it is a system that deals directly with customers, any trouble with its computers or communications facilities could be greatly inconvenient to those customers. This article outlines the configuration of the hardware and network that could be called CUSTOM's nervous system.
引用
收藏
页码:73 / 76
页数:4
相关论文
共 50 条
  • [21] Investigation on Electronic Network Information Security Assurance
    Lan Shourong
    Li Xiaojin
    EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 635 - 640
  • [22] Network Slicing Security Controls and Assurance for Verticals
    Wichary, Tomasz
    Batalla, Jordi Mongay
    Mavromoustakis, Constandinos X.
    Zurek, Jerzy
    Mastorakis, George
    ELECTRONICS, 2022, 11 (02)
  • [23] Use of a Bayesian network in software reliability assurance
    Office of Mission and Safety Assurance, NASA Headquarters, 300 E Street SW, Washington, DC 24546, United States
    Int. J. Perform. Eng., 2006, 4 (305-314):
  • [24] Hardware Attack and Assurance with Machine Learning: A Security Threat to Circuits and Systems
    Gwee, Bah-Hwee
    APCCAS 2020: PROCEEDINGS OF THE 2020 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2020), 2020, : 1 - 1
  • [25] Self-configuration of network security
    Chen, Huoping
    Al-Nashif, Youssif B.
    Qu, Guangzhi
    Hariri, Salim
    11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 97 - 108
  • [26] Network Security : Formal and Optimized Configuration
    Fall, Marfall N.
    Mejri, Mohamed
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2010, 217 : 229 - 246
  • [27] Network security - Hardware encryption for fast VPNs
    不详
    IEEE INTERNET COMPUTING, 1999, 3 (01) : 17 - 17
  • [28] Poster: Hardware Security for IoT Wireless Network
    Sunkara, Uday Kiran
    Abiru, Abdulquadri
    Morman, Kyle R.
    Costin, Aaron
    2024 IEEE 10TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT 2024, 2024, : 324 - 325
  • [29] Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach
    Fournaris, Apostolos P.
    Tselios, Christos
    Haleplidis, Evangelos
    Athanasopoulos, Elias
    Dionysiou, Antreas
    Mitropoulos, Dimitrios
    Louridas, Panos
    Christou, Georgios
    Athanatos, Manos
    Hatzivasilis, George
    Georgopoulos, Konstantinos
    Kalogeros, Costas
    Kotselidis, Christos
    Vogl, Simon
    Hamon, Francois
    Ioannidis, Sotiris
    2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023, 2023, : 80 - 86
  • [30] Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory
    Sergei Skorobogatov
    Journal of Hardware and Systems Security, 2018, 2 (4) : 314 - 321