A taxonomy of five elements to evaluate a secure network (Englisch)
Freier Zugriff
- Neue Suche nach: Portillo, E.
- Neue Suche nach: Carracedo, J.
- Neue Suche nach: Portillo, E.
- Neue Suche nach: Carracedo, J.
In:
Communications and Multimedia Security
;
133-140
;
1997
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A taxonomy of five elements to evaluate a secure network
-
Beteiligte:Portillo, E. ( Autor:in ) / Carracedo, J. ( Autor:in )
-
Erschienen in:Communications and Multimedia Security ; 133-140
-
Verlag:
- Neue Suche nach: Springer US
-
Erscheinungsort:Boston, MA
-
Erscheinungsdatum:01.01.1997
-
Format / Umfang:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Overall Integrity of Service Control in TINA NetworksStaamann, S. et al. | 1997
- 16
-
Implementing security at the external interfaces of TMNsAndrianopoulos, George / Ganivet, Nicolas / Hofseth, Lars / Maillot, Dominique / Ølnes, Jon / Strick, Linda et al. | 1997
- 33
-
Addressing Threats and Security Issues in World Wide Web TechnologyGritzalis, Stefanos / Spinellis, Diomidis et al. | 1997
- 47
-
A Framework and Prototyping Environment for a W3 Security ArchitectureNeumann, Gustaf / Nusser, Stefan et al. | 1997
- 61
-
Security Issues in a Mobile Computing ParadigmMavridis, I. / Pangalos, G. et al. | 1997
- 77
-
MMIP — Mixed Mobile Internet ProtocolLopatic, T. / Eckert, C. / Baumgarten, U. et al. | 1997
- 91
-
A Cryptosystem Based on Error Control Codes and Stream CiphersDawson, E. / Polemi, D. et al. | 1997
- 102
-
Self-certified keys — Concepts and ApplicationsPetersenl, Holger / Horster, Patrick et al. | 1997
- 119
-
Formal methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art reviewGritzalis, S. / Nikitakos, N. / Georgiadis, P. et al. | 1997
- 133
-
A taxonomy of five elements to evaluate a secure networkPortillo, E. / Carracedo, J. et al. | 1997
- 143
-
Link Encryption in ATM SystemsRieke, Andreas et al. | 1997
- 155
-
B-ISDN user plane confidentiality by ATM cell stream intercepting encryptionLeitold, Herbert / Posch, Reinhard et al. | 1997
- 169
-
Role Based Access Control in Distributed SystemsVandenwauver, M. / Govaerts, R. / Vandewalle, J. et al. | 1997
- 178
-
The security API of IRO-DBEßmayr, W. / Pernul, G. / Tjoa, A. M. et al. | 1997
- 193
-
The Digital Signature InitiativeLipp, Peter / Sterbenz, Andreas et al. | 1997
- 203
-
A New Security Service Non-Repudiation of Mutual AgreementPiltz, S. et al. | 1997
- 215
-
A Technical Approach to the Transparent Encryption of MPEG-2 VideoDittmann, J. / Steinmetz, A. et al. | 1997
- 227
-
A comprehensive authentication and supervision architecture for networked multimedia systemsFurnell, S. M. / Illingworth, H. M. / Katsikas, S. K. / Reynolds, P. L. / Sanders, P. W. et al. | 1997
- 239
-
Using datagram based multimedia streams as a cover channel for hidden transmissionPatel, Ahmed / Schmidt, Nikita / Bessonov, Mikhail et al. | 1997
- 253
-
How to Support Secure Electronic Contract SigningZhang, N. / Shi, Q. et al. | 1997
- 265
-
Issues for the Commercial Distribution of Electronic DocumentsPrevelakis, Vassilis / Konstantas, Dimitri / Morin, Jean-Henry et al. | 1997
- 279
-
Status of the Computer Network Security Activities of the People’s Republic of ChinaKozik, E. et al. | 1997
- 295
-
An approach to security for world-wide applicationsBryce, Ciarán / Kühnhauser, Winfried et al. | 1997
- 307
-
Secure group communication: a dynamic approachAlexandris, Nikos / Burmester, Mike / Chrissikopoulos, Vassilis et al. | 1997