Security management: Targets, essentials and implementations

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We first analyze security targets of implementing security management for nowadays IT infrastructures - information systems created by enterprises for successful business, and detail possible measures for achieving relevant targets. Secondly, we conclude that the essentials of security management are to construct trustworthy network endpoints, and to establish trustworthy communication channel between intending communication parties; then two instances of accomplishing the essentials of security management are exemplified, i.e. trustworthy smart card transaction and trustworthy SOA-Based Web Services. At last, we discuss the main aspects of implementing security management for information systems, precisely, strategic steps, i.e. (1) attestation and negotiation, (2) proposing and implementing application-specific strategies, and (3) considerations for strength and efficiency of security management. © 2007 Springer.

Cite

CITATION STYLE

APA

Zhao, J., & Zheng, J. (2007). Security management: Targets, essentials and implementations. In Advances and Innovations in Systems, Computing Sciences and Software Engineering (pp. 211–216). https://doi.org/10.1007/978-1-4020-6264-3_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free