메뉴 건너뛰기




Volumn 12, Issue 3, 1999, Pages 114-131

Aspects of computer security: A primer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; HOSPITAL DATA PROCESSING; IMAGE COMMUNICATION SYSTEMS; SECURITY OF DATA;

EID: 0032588843     PISSN: 08971889     EISSN: None     Source Type: Journal    
DOI: 10.1007/BF03168630     Document Type: Article
Times cited : (8)

References (26)
  • 1
    • 84860422892 scopus 로고    scopus 로고
    • Network and data security design for telemedicine applications
    • Makris L, Argiriou N, Strintzis M: Network and data security design for telemedicine applications. Med Informatics 22:133-142, 1997
    • (1997) Med Informatics , vol.22 , pp. 133-142
    • Makris, L.1    Argiriou, N.2    Strintzis, M.3
  • 2
    • 0030917832 scopus 로고    scopus 로고
    • Strategy for securing medical documents by electronic signature and encryption
    • Willenberg C: Strategy for securing medical documents by electronic signature and encryption. Radiology 37(4):305-312, 1997
    • (1997) Radiology , vol.37 , Issue.4 , pp. 305-312
    • Willenberg, C.1
  • 3
    • 0021600381 scopus 로고
    • An overview of computer security
    • Summers R: An overview of computer security. IBM Systems J 23:309-325, 1984
    • (1984) IBM Systems J , vol.23 , pp. 309-325
    • Summers, R.1
  • 4
    • 2442764329 scopus 로고    scopus 로고
    • Designing a safe network using firewalls
    • Wouters P: Designing a safe network using firewalls. Linux J 40:32-38, 1997
    • (1997) Linux J , vol.40 , pp. 32-38
    • Wouters, P.1
  • 5
    • 2442747817 scopus 로고    scopus 로고
    • Haunted by the ghost of smurfing
    • Thomas RO: Haunted by the ghost of smurfing. Sys-Admin 7:63-64, 1999
    • (1999) Sys-Admin , vol.7 , pp. 63-64
    • Thomas, R.O.1
  • 6
    • 2442762112 scopus 로고    scopus 로고
    • Who is at the door: The SYN denial of service
    • Stewart D, Maginnis P, Simpson T: Who is at the door: The SYN denial of service. Linux J 38:12-16, 1997
    • (1997) Linux J , vol.38 , pp. 12-16
    • Stewart, D.1    Maginnis, P.2    Simpson, T.3
  • 7
    • 2442768171 scopus 로고    scopus 로고
    • Wrap a security blanket around your computer
    • Brotzman L: Wrap a security blanket around your computer. Linux J 40:17-23, 1997
    • (1997) Linux J , vol.40 , pp. 17-23
    • Brotzman, L.1
  • 8
    • 84860077907 scopus 로고    scopus 로고
    • Smart cards and biomentrics: Your key to PKI
    • Corcoran D, Sims D, Hillhouse B: Smart cards and biomentrics: Your key to PKI. Linux J 59:68-71, 1999
    • (1999) Linux J , vol.59 , pp. 68-71
    • Corcoran, D.1    Sims, D.2    Hillhouse, B.3
  • 13
    • 0001903688 scopus 로고
    • The IDEA encryption algorithm
    • Schneier B: The IDEA encryption algorithm. Dr Dobb's J 18:50-56, 1993
    • (1993) Dr Dobb's J , vol.18 , pp. 50-56
    • Schneier, B.1
  • 14
    • 2442748576 scopus 로고
    • Pretty good privacy
    • Stallings W: Pretty good privacy. ConnecXions 8:2-11, 1994
    • (1994) ConnecXions , vol.8 , pp. 2-11
    • Stallings, W.1
  • 15
    • 2442752242 scopus 로고    scopus 로고
    • Encrypted file systems
    • Giles B: Encrypted file systems. Linux J 51:64-67, 1997
    • (1997) Linux J , vol.51 , pp. 64-67
    • Giles, B.1
  • 16
    • 2442768922 scopus 로고    scopus 로고
    • TCFS: Transparent cryptographic file system
    • Mauriello E: TCFS: Transparent cryptographic file system. Linux J 40:64-68, 1997
    • (1997) Linux J , vol.40 , pp. 64-68
    • Mauriello, E.1
  • 17
    • 0039002059 scopus 로고    scopus 로고
    • A file system for the 21st century: Previewing the Windows NT 5.0 file system
    • November
    • Richter J, Cabrera L: A file system for the 21st century: Previewing the Windows NT 5.0 file system. Microsoft Systems J November 1998
    • (1998) Microsoft Systems J
    • Richter, J.1    Cabrera, L.2
  • 18
    • 2442741208 scopus 로고    scopus 로고
    • Virtual private networks
    • Whalin G: Virtual private networks. Sys-Admin 7:21-26, 1999
    • (1999) Sys-Admin , vol.7 , pp. 21-26
    • Whalin, G.1
  • 21
    • 2442726360 scopus 로고    scopus 로고
    • SATAN: Analyzing your network
    • Havelt R: SATAN: Analyzing your network. Linux J 40:77-78, 1997
    • (1997) Linux J , vol.40 , pp. 77-78
    • Havelt, R.1
  • 22
    • 2442749309 scopus 로고    scopus 로고
    • Freeware based security
    • Ali S: Freeware based security, Sys-Admin 8:39-44, 1999
    • (1999) Sys-Admin , vol.8 , pp. 39-44
    • Ali, S.1
  • 23
    • 2442738967 scopus 로고    scopus 로고
    • Tripping up intruders with tripwire
    • Fenzi K: Tripping up intruders with tripwire. Linux J 40:75-76, 1997
    • (1997) Linux J , vol.40 , pp. 75-76
    • Fenzi, K.1
  • 24
    • 0008318806 scopus 로고    scopus 로고
    • NT vs. UNIX: Is one substantially better?
    • Russinovich M: NT vs. UNIX: Is one substantially better? Windows NT 4:121-132, 1998
    • (1998) Windows NT , vol.4 , pp. 121-132
    • Russinovich, M.1
  • 25
    • 2442744961 scopus 로고    scopus 로고
    • IT Security coming of age
    • Hare C: IT Security coming of age. Sys-Admin 7:57-64, 1998
    • (1998) Sys-Admin , vol.7 , pp. 57-64
    • Hare, C.1
  • 26
    • 0031987340 scopus 로고    scopus 로고
    • Security for the digital information age of medicine: Issues, applications, and implementation
    • Epstein MA, Pasieka MS, Lord WP, et al: Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11:33-44, 1998
    • (1998) J Digit Imaging , vol.11 , pp. 33-44
    • Epstein, M.A.1    Pasieka, M.S.2    Lord, W.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.