Data communications controls (Englisch)

Nationallizenz
In: Computers and Security   ;  2 ,  1  ;  67-72  ;  1983
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?

Download

Download ist DRM geschützt.


Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Abstract Computer systems employing data communications networks, such as distributed data processing systems, on line real-time computer systems, and electronic funds transfer systems are expected to significantly increase in the future. These systems require the electronic transmission of messages between a sending station and a receiving station. However, the message transmitted from the sending station may be distorted, modified, or destroyed due to faulty equipment, power fluctuations, cross-talk, and atmospheric conditions. To insure that the receiving end obtains the original message, proper controls must be incorporated into the data communications network. This paper will examine the following data communications controls: integrity controls, privacy and confidentiality measures, and backup and recovery controls.

Inhaltsverzeichnis – Band 2, Ausgabe 1

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

1
Editorial
Highland, Harold Joseph | 1983
3
Three new members of the International Board of Editors
| 1983
5
Effective information system security with password controls
Wood, Charles Cresson | 1983
11
Notes on terrorism and data processing
Menkus, Belden | 1983
16
Computer security: Observations on the state of the technology
Murray, William H. | 1983
24
Methodology for security analysis of data-processing systems
Caroll, John M. / Wu, Oi-Lun | 1983
35
Unique approach to security evaluation
Backwith, Nigel | 1983
41
Controlling cryptographic publication
Weingarten, F. | 1983
49
Towards a new approach to secure database design
Bussolati, U. / Martella, G. | 1983
63
Computer crime and its prevention
Goldstein, Bruce | 1983
67
Data communications controls
Cerullo, Michael J. | 1983
73
EFTS impact on computer security
Guynes, Steve | 1983
78
Securing the distributed word processing network
Callaghan, David R. | 1983
82
The hut six story: Breaking the Enigma codes
H, HJ | 1983
83
Codes, ciphers and computers: An introduction to information security
H, HJ | 1983
83
CBEMA privacy and security bibliography (October 1982)
H, HJ | 1983
84
Tutorial: The security of data in networks
H, HJ | 1983
84
Advances in computer system security
H, HJ | 1983
85
The Office of Technology Assessment reports
| 1983
88
Abstracts of recent articles and literature
| 1983
97
Calendar
| 1983
CO2
Editorial Board
| 1983