Search results

1 – 2 of 2
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 March 1993

Fredric B. Gluck

Outlines the Open Security Architecture (OSA). OSA is anarchitecture which will provide the basis for the selection, design andintegration of products providing security and…

378

Abstract

Outlines the Open Security Architecture (OSA). OSA is an architecture which will provide the basis for the selection, design and integration of products providing security and control for a network of desktop personal computers, “mobile” notebook computers, servers and mainframes. States that the purpose of this architecture is to provide an environment where: acceptable and workable controls can be placed on sensitive data; user productivity and existing investments in applications are not negatively impacted by the addition of control and security; data flow around the organization, and the investment that has been put in place to support this capability (e.g. local‐area, wide‐area, and telephonebased networks) can still be used to enhance information exchange between users; and all workstations, regardless of their location, operating system, or capability to connect to a network, can be included and easily administered under this architecture.

Details

Information Management & Computer Security, vol. 1 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1994

Fredric B. Gluck

As more and more information is moved around the organization and theworld using the growing E‐mail and electronic messaging infrastructure,what technologies are available to…

4068

Abstract

As more and more information is moved around the organization and the world using the growing E‐mail and electronic messaging infrastructure, what technologies are available to ensure that these messages are protected, that the recipient is positive of the sender′s identity and that messages are not damaged or altered in transit? The paper‐based world of message exchange takes these capabilities for granted by using envelopes and signatures. How are these and similar protection mechanisms implemented in the world of electronic documents, E‐mail and electronic messaging? Provides a survey of the technology used to provide digital signatures, message authentication and message protection. It explains how these technologies work and how they can be used in an existing messaging infrastructure to allow the sending and receiving of sensitive information.

Details

Information Management & Computer Security, vol. 2 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 2 of 2
Per page
102050