Pregled bibliografske jedinice broj: 88710
Data protection : identifications and autentification in applications and protocols
Data protection : identifications and autentification in applications and protocols // Management in Evropska unija : zbornik 21. konference z mednarodno udeležbo / Vukovič, Goran (ur.).
Kranj: Moderna organizacija, 2002. str. 1011-1025 (predavanje, nije recenziran, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 88710 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Data protection : identifications and autentification in applications and protocols
Autori
Vrbanec, Tedo ; Hutinski, Željko
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Management in Evropska unija : zbornik 21. konference z mednarodno udeležbo
/ Vukovič, Goran - Kranj : Moderna organizacija, 2002, 1011-1025
ISBN
961-232-133-7
Skup
Znanstvena konferenca o razvoju organizacijskih ved (21 ; 2002)
Mjesto i datum
Portorož, Slovenija, 27.03.2002. - 29.03.2002
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Nije recenziran
Ključne riječi
ISO17799 Security standard; security policies; certification
Sažetak
Information security has to respect three contradictory requests: protection of confidentiality, integrity and availability of information. The concept of building security of the information systems distinguishes many approaches. On the level of identification, authentication and authorization of users, users rights, authentication and authorization of users data, many systems of protocols and applications have been developed, which increase the level of security systems. Cryptography and coding are the basic ways of data protection. Implementation of the protection is carried out by crypto algorithms, which correspond to the demanding level of data security and verification of user's authenticity. All methods of data protection are based on the crypto algorithms by which messages become senseless to those whose are not authorized users. Furthermore, several methods and protocols of key interchange are in use, which have a crucial role in crypting and users authentication. Defining the security policies and designing the security elements lead to a safe and secure environment for information systems as a main support for open and dynamic business systems.
Izvorni jezik
Engleski
Znanstvena područja
Informacijske i komunikacijske znanosti
POVEZANOST RADA
Projekti:
016003
Ustanove:
Fakultet organizacije i informatike, Varaždin,
Visoka učiteljska škola u Čakovcu