Narrow your search
Listing 1 - 10 of 34 << page
of 4
>>
Sort by

Book
IEEE Std 802.1AR-2018 (Revision of IEEE Std 802.1AR-2009) - Redline : IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity - Redline
Author:
ISBN: 150445698X Year: 2018 Publisher: New York, New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device's identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=68).


Book
Electronic Security : Risk Mitigation in Financial Transactions-Public Policy Issues
Authors: --- ---
Year: 2002 Publisher: Washington, D.C. : World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: • The legal framework and enforcement. • Electronic security of payment systems. • Supervision and prevention challenges. • The role of private insurance as an essential monitoring mechanism. • Certification, standards, and the role of the public and private sectors. • Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. • Improving overall education on these issues as a key to enhancing prevention. This paper-a product of the Financial Sector Strategy and Policy Department-is part of a larger effort in the department to study sustainable financial development. Thomas Glaessner may be contacted at tglaessner@worldbank.org.


Book
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on.
Author:
Year: 1994 Publisher: Los Alamitos : IEEE Computer Society Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Beveilig uw woning elektronisch
Author:
ISBN: 9781616277826 Year: 2010 Publisher: Lembeek Geert Van Cauwenbergh

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on.
Author:
Year: 1994 Publisher: Los Alamitos : IEEE Computer Society Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Schnelleinstieg in SAP GRC - Access Control
Authors: ---
ISBN: 3960126867 Year: 2017 Publisher: Gleichen : Espresso Tutorials,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Electronic Access Control.
Author:
ISBN: 9780128093405 0128093404 9780128054659 0128054654 Year: 2017 Publisher: San Diego : Elsevier Science & Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Annotation

Multimedia video-based surveillance systems : requirements, issues, and solutions
Authors: --- ---
ISBN: 0792379276 Year: 2000 Publisher: Boston (Mass.) : Kluwer academic,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Audit of the Federal Bureau of Prisons' perimeter security upgrade contract for Administrative U.S. Penitentiary Thomson awarded to DeTekion Security Systems, Incorporated.
Author:
Year: 2019 Publisher: Washington, DC : Office of the Inspector General, U.S. Department of Justice,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Force Protection Surveillance System : algorithm and performance
Authors: ---
Year: 2010 Publisher: Adelphi, MD : Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 34 << page
of 4
>>
Sort by