Warianty tytułu
Języki publikacji
Abstrakty
IT security of computer networks plays an increasingly important role in business operations; but at the same time the importance of its systematic improvement not always is perceived,nor are implemented ameliorations due to incorrectly accepted models or strategies. Some models of the global computer network comprehensive protection, called trust framework, are discussed by the author of this article. (original abstract)
Bezpieczeństwo informatyczne sieci komputerowych odgrywa coraz większą rolę w operacjach biznesowych, ale jednocześnie nie zawsze jest dostrzegane znaczenie systematycznego jego poprawiania, ani nie są wdrażane udoskonalenia na skutek niepoprawnie przyjętych modeli lub strategii. Artykuł omawia wybrane modele kompleksowej ochrony światowej sieci komputerowej, tzw. trust framework. (abstrakt oryginalny)
Twórcy
autor
- Penn State University - Fayett
Bibliografia
- Azzedin F., Maheswaran M., Evolving and Managing Trust in Grid Computing Systems, "Proceedings of IEEE Canadian Conference on Electrical & Computer Engineering", 2002, pp. 1424-1429.
- Balakrishnan V. et al., Subjective Logic Based Trust Model for mobile Ad Hoc Networks,"Securecomm", 2008, Sept. 22-25, Istanbul, Turkey. ISBN 978-1-60558-241-1.
- Balakrishnan V. et al., "Securecomm", 2008, Trust Enhanced Security Framework For Mobile Ad Hoc Wireless Networks,Ph.D. Thesis, Dept. of Computing, Macquarie University, Sydney 2010.
- Gapinski A., Algebraic Framework for Computer Network Security. In preparation.
- Josang A., A Logic for Uncertain Probabilities, "International Journal of Uncertainty. Fuzziness and Knowledge-Based Systems", 2001, No. 9(3), pp. 279-311.
- Kenyon H.S., Changing Strategy for Computer Network Defense, 2000, http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=1872&zoneid=254.
- National Information Assurance Glossary, CNSS Instruction, No 4009, 2010, http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf.
- Schou C., Shoemaker D., Information Assurance for the Enterprise. A Roadmap to Information Security." McGraw-Hill, New York 2007.
- Solomon M.G., Chapple M., Information Security Illuminated, Jones & Bartlett Publishers, Sudbary, Massachusetts 2005.
- SooHoo K.J., How Much Is Enough? A Risk-Management Approach to Computer Security, Consortium for Research on Information Security and Policy (CRISP), Stanford University 2000.
- http://csrc.nist.gov/publications/PubsFIPS.html.
- http://en.wikipedia.org/wiki/Risk.
- http://tools.ietf.org/html/rfc2196.
- www.britannica.com/EBchecked/topic/538577/Claude-Shannon.
- www.cisco.com/en/US/docs/ios/11_0/router/configuration/gde/ciproute.htm.
- www.ibm.com/federal/security.
- www.merriam-webster.com/dictionary/trust.
- www.oxforddictionaries.com.
- www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-201_en_xg.pdf
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171307389