You need JavaScript to view this

Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

Abstract

The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.
Authors:
Matsui, S [1] 
  1. Central Research Institute of Electric Power Industry, Tokyo (Japan)
Publication Date:
May 01, 1997
Product Type:
Technical Report
Report Number:
CRIE-R-96020
Reference Number:
SCA: 990300; 990100; PA: JP-97:0K0377; EDB-98:047289; NTS-98:005006; SN: 98001934674
Resource Relation:
Other Information: PBD: May 1997
Subject:
99 MATHEMATICS, COMPUTERS, INFORMATION SCIENCE, MANAGEMENT, LAW, MISCELLANEOUS; INFORMATION SYSTEMS; DISTRIBUTION; SECURITY; COMPUTER NETWORKS; MANAGEMENT; IDENTIFICATION SYSTEMS; INTERCEPTION; INTRUSION DETECTION SYSTEMS
OSTI ID:
604193
Research Organizations:
Central Research Inst. of Electric Power Industry, Tokyo (Japan)
Country of Origin:
Japan
Language:
Japanese
Other Identifying Numbers:
Other: ON: DE98745988; TRN: JN97K0377
Availability:
Available from Central Research Institute of Electric Power Industry, 1-6-1, Otemachi, Chiyoda-ku, Tokyo,(Japan); OSTI as DE98745988
Submitting Site:
NEDO
Size:
20 p.
Announcement Date:
May 28, 1998

Citation Formats

Matsui, S. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo. Japan: N. p., 1997. Web.
Matsui, S. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo. Japan.
Matsui, S. 1997. "Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo." Japan.
@misc{etde_604193,
title = {Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo}
author = {Matsui, S}
abstractNote = {The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.}
place = {Japan}
year = {1997}
month = {May}
}