Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 88688

Security policy implementation within distributed organisations confidential data transfer


Hutinski, Željko; Pavlinušić, Dobrica
Security policy implementation within distributed organisations confidential data transfer // Zbornik posvetovanja z mednarodno udeležbo
Portorož, Slovenija, 2000. (predavanje, nije recenziran, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 88688 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Security policy implementation within distributed organisations confidential data transfer

Autori
Hutinski, Željko ; Pavlinušić, Dobrica

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
Zbornik posvetovanja z mednarodno udeležbo / - , 2000

Skup
19. Posvetovanje organizatorjev dela, Management v novem tisočletju

Mjesto i datum
Portorož, Slovenija, 29.03.2000. - 31.03.2000

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Nije recenziran

Sažetak
Globalization of business systems has great influence on changes in organization and communication. Such events can also reflect on changes within structures of an information system. The most frequent form of organization of an information-communication system is distributed structure of a sub-system and its elements. Importance of the data contents defines the need of their protection which is particularly important in distributed systems, i.e. in systems that anticipate the network communication. This paper describes the implementation of different security policies when the goal of distributed organization is to communicate securely. We are considering the threats that appear when an organization wants to communicate with its geographically distributed branches using the Internet as a medium. Main goal is to demonstrate which methods should be employed in security policy to protect the data flow against potential threats. Security conscious users have two methods of defense against these problems: controls and encryption. While controls provide the way to control the access to sensitive information, they do not help us much in an organization requiering to communicate securely over the Internet (or over any other public packet-based network) as a medium. The only logical choice is the encryption.

Izvorni jezik
Engleski

Znanstvena područja
Informacijske i komunikacijske znanosti



POVEZANOST RADA


Projekti:
016003

Ustanove:
Fakultet organizacije i informatike, Varaždin

Profili:

Avatar Url Željko Hutinski (autor)


Citiraj ovu publikaciju:

Hutinski, Željko; Pavlinušić, Dobrica
Security policy implementation within distributed organisations confidential data transfer // Zbornik posvetovanja z mednarodno udeležbo
Portorož, Slovenija, 2000. (predavanje, nije recenziran, cjeloviti rad (in extenso), znanstveni)
Hutinski, Ž. & Pavlinušić, D. (2000) Security policy implementation within distributed organisations confidential data transfer. U: Zbornik posvetovanja z mednarodno udeležbo.
@article{article, author = {Hutinski, \v{Z}eljko and Pavlinu\v{s}i\'{c}, Dobrica}, year = {2000}, pages = {616 and \#38;\#8211 ; ; 624}, keywords = {}, title = {Security policy implementation within distributed organisations confidential data transfer}, keyword = {}, publisherplace = {Portoro\v{z}, Slovenija} }
@article{article, author = {Hutinski, \v{Z}eljko and Pavlinu\v{s}i\'{c}, Dobrica}, year = {2000}, pages = {616 and \#38;\#8211 ; ; 624}, keywords = {}, title = {Security policy implementation within distributed organisations confidential data transfer}, keyword = {}, publisherplace = {Portoro\v{z}, Slovenija} }




Contrast
Increase Font
Decrease Font
Dyslexic Font