Data protection : identifications and autentification in applications and protocols (CROSBI ID 484796)
Prilog sa skupa u zborniku | izvorni znanstveni rad
Podaci o odgovornosti
Vrbanec, Tedo ; Hutinski, Željko
engleski
Data protection : identifications and autentification in applications and protocols
Information security has to respect three contradictory requests: protection of confidentiality, integrity and availability of information. The concept of building security of the information systems distinguishes many approaches. On the level of identification, authentication and authorization of users, users rights, authentication and authorization of users data, many systems of protocols and applications have been developed, which increase the level of security systems. Cryptography and coding are the basic ways of data protection. Implementation of the protection is carried out by crypto algorithms, which correspond to the demanding level of data security and verification of user's authenticity. All methods of data protection are based on the crypto algorithms by which messages become senseless to those whose are not authorized users. Furthermore, several methods and protocols of key interchange are in use, which have a crucial role in crypting and users authentication. Defining the security policies and designing the security elements lead to a safe and secure environment for information systems as a main support for open and dynamic business systems.
ISO17799 Security standard; security policies; certification
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
Podaci o prilogu
1011-1025.
2002.
objavljeno
Podaci o matičnoj publikaciji
Management in Evropska unija : zbornik 21. konference z mednarodno udeležbo
Vukovič, Goran
Kranj: Moderna organizacija
961-232-133-7
Podaci o skupu
Znanstvena konferenca o razvoju organizacijskih ved (21 ; 2002)
predavanje
27.03.2002-29.03.2002
Portorož, Slovenija