Security techniques for the global information infrastructure

被引:0
|
作者
Fumy, Walter [1 ]
Haas, Ingbert [1 ]
机构
[1] Siemens AG, Munich, Germany
来源
Conference Record / IEEE Global Telecommunications Conference | 1998年 / 6卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:3141 / 3146
相关论文
共 50 条
  • [31] INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A., V
    Kravets, O. Ja
    Choporov, O. N.
    Zelenina, A. N.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 67 - 76
  • [32] Design infrastructure of security system in medical information
    Chen, XM
    Zhang, JG
    JOURNAL OF INFRARED AND MILLIMETER WAVES, 2005, 24 (01) : 71 - 75
  • [33] A CBK for Information Security and Critical Information and Communication Infrastructure Protection
    Theoharidou, Marianthi
    Xidara, Dimitra
    Gritzalis, Dimitris
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 81 - 96
  • [34] Global Information Security Factors
    White, Garry
    Long, Ju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 49 - 60
  • [35] Influence of Established Information Security Governance and Infrastructure on Future Security Certifications
    Sedinic, Ivan
    Lovric, Zrinka
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1111 - 1115
  • [36] Behaviour analysis techniques for supporting critical infrastructure security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 267 - 287
  • [37] INFORMATION SECURITY IN THE AIRCRAFT ACCESS TO SYSTEM WIDE INFORMATION MANAGEMENT INFRASTRUCTURE
    Moallemi, Mohammad
    Castro-Pena, Carlos A.
    Towhidnejad, Massood
    Abraham, Biruk
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [38] Borders in cyberspace: Information policy and the global information infrastructure.
    Warner, J
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1998, 49 (04): : 387 - 388
  • [39] INFORMATION TECHNOLOGY - SECURITY TECHNIQUES AND STANDARDIZATION
    KRAUSE, L
    COMPUTER STANDARDS & INTERFACES, 1995, 17 (01) : 63 - 67
  • [40] Computer graphics and visualization in the global information infrastructure
    Gershon, N
    Brown, JR
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1996, 16 (02) : 60 - 61