Abstract
The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.
Matsui, S
[1]
- Central Research Institute of Electric Power Industry, Tokyo (Japan)
Citation Formats
Matsui, S.
Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo.
Japan: N. p.,
1997.
Web.
Matsui, S.
Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo.
Japan.
Matsui, S.
1997.
"Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo."
Japan.
@misc{etde_604193,
title = {Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo}
author = {Matsui, S}
abstractNote = {The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.}
place = {Japan}
year = {1997}
month = {May}
}
title = {Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo}
author = {Matsui, S}
abstractNote = {The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.}
place = {Japan}
year = {1997}
month = {May}
}