Information Assurance for security protocols
نویسندگان
چکیده
منابع مشابه
Information Assurance for security protocols
Security protocols are used pervasively to protect distributed communications in the third Millennium. This motivates the need for a definition of Information Assurance for security protocols, which, to the best of our knowledge, is still missing. Such a definition is advanced in terms of the requirements that security protocols be analysed at the same time realistically, accurately and formall...
متن کاملInformation Assurance and Security
Information assurance contains all the elements of information security (confidentiality) but also includes elements of availability, and integrity. Information assurance provides a view of information protection that includes defensive measures in all three states — processing, storage, and transmission. To defend information and data there are three fundamental countermeasure categories: 1. t...
متن کاملCost Tradeoffs for Information Security Assurance
Information security is important in proportion to an organization’s dependence on information technology. Security of a computer based information system should protect the Confidentiality, Integrity and Availability (CIA) aspects of the system. With the increasing dependence of business processes on information technology, the number of attacks against CIA aspects have increased manifold. Sin...
متن کاملInformation Assurance Protocols: Efficiency Analysis and Implementation for Secure Communication
Two major issues are considered in this paper: security of communication and reliability of connection. The paper demonstrates how to interlink both the security requirement and communication assurance into one algorithmic procedure. Several reliability protocols are described and their characteristics (probabilities of failure, bandwidth requirement per block of transmitted ciphertext and comp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2005
ISSN: 0167-4048
DOI: 10.1016/j.cose.2004.10.004