We first analyze security targets of implementing security management for nowadays IT infrastructures - information systems created by enterprises for successful business, and detail possible measures for achieving relevant targets. Secondly, we conclude that the essentials of security management are to construct trustworthy network endpoints, and to establish trustworthy communication channel between intending communication parties; then two instances of accomplishing the essentials of security management are exemplified, i.e. trustworthy smart card transaction and trustworthy SOA-Based Web Services. At last, we discuss the main aspects of implementing security management for information systems, precisely, strategic steps, i.e. (1) attestation and negotiation, (2) proposing and implementing application-specific strategies, and (3) considerations for strength and efficiency of security management. © 2007 Springer.
CITATION STYLE
Zhao, J., & Zheng, J. (2007). Security management: Targets, essentials and implementations. In Advances and Innovations in Systems, Computing Sciences and Software Engineering (pp. 211–216). https://doi.org/10.1007/978-1-4020-6264-3_38
Mendeley helps you to discover research relevant for your work.