Ngày tải lên :
22/03/2014, 15:21
... standardized according to the
information that was transferred across the
network. The original transfer of information was
mostly text‐based. As the internet expanded and
technologyevolved,otherformsofcommunication
began ... inInternetsecurity,"
DistributedComputingSystems,1997.,Proceedingsof
theSixthIEEEComputerSocietyWorkshoponFuture
Trendsof,vol.,no.,pp.216‐217,29‐31Oct1997
[16]Curtin,M.“IntroductiontoNetworkSecurity,”
http://www.interhack.net/pubs/network‐security.
[17]“ImprovingSecurity,”
http://www.cert.org/tech_tips,2006.
[18]Serpanos,D.N.;Voyiatzis,A.G.,"Securenetwork
design:Alayeredapproach,"AutonomousDecentralized
System,2002.The2ndInternationalWorkshopon,vol.,
no.,pp.95‐100,6‐7Nov.2002
[19]Ohta,T.;Chikaraishi,T.,"Networksecuritymodel,"
Networks,1993.InternationalConferenceon
Information Engineering '93.'Communications and
Networks for the Year 2000',ProceedingsofIEEE
SingaporeInternationalConferenceon,vol.2,no.,
pp.507‐511vol.2,6‐11Sep1993
... attributes.
Theywerementioned before in a slightlydifferent
form, but are restated for convenience and
emphasis. These security attributes are
confidentiality,integrity,privacy, and availability.
Confidentiality...