메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 517-524

Comparative analysis and design philosophy of next generation unified enterprise application security

Author keywords

Application security; Identity and access management; Unified architecture

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; INFORMATION ANALYSIS; INFORMATION MANAGEMENT; SECURITY OF DATA;

EID: 33845335178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICET.2005.1558935     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 33845333646 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Federal Trade Commission, May 23
    • Gramm-Leach-Bliley Act, "Standards for safeguarding customer information", Federal Trade Commission, May 23, 2002 http://www.ftc.gov/os/2002/05/67fr36585.pdf
    • (2002) Standards for Safeguarding Customer Information
  • 2
    • 33845332515 scopus 로고    scopus 로고
    • Health insurance portability and accountability act, Public law, Aug, 21
    • th congress, Aug, 21, 1996 http://aspe.os.dhhs.gov/admnsimp/p1104191.html
    • (1996) th Congress
  • 3
    • 33845333959 scopus 로고    scopus 로고
    • Sarbanes-Oxley Act, HR3763
    • th Congress, 2002 http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf
    • (2002) th Congress
  • 8
    • 33845346270 scopus 로고    scopus 로고
    • Application defense: Next generation of unified enterprise security
    • Islamabad, Pakistan
    • Saeed Rajput, and Basil Hussain, "Application Defense: Next Generation of Unified Enterprise Security". International Workshop on Frontiers of Information, Islamabad, Pakistan, 2003
    • (2003) International Workshop on Frontiers of Information
    • Rajput, S.1    Hussain, B.2
  • 9
    • 33845309779 scopus 로고    scopus 로고
    • eTrust IAM Suite of Computer Associates Inc., http://www3.ca.com/Files/Brochures/etrust_iam_brochure_1.pdf
  • 10
    • 33845341226 scopus 로고    scopus 로고
    • InnerGuard of Cerebit Inc., http://www.cerebit.com/ cerebit_innerguard.html
  • 11
    • 33845312081 scopus 로고    scopus 로고
    • IAM Suite of Entrust Inc., http://www.entrust.com/
  • 12
    • 33845302169 scopus 로고    scopus 로고
    • Access Master of Evidian Inc., http://www.evidian.com/security/index.htm
  • 13
    • 33845327637 scopus 로고    scopus 로고
    • IAM Suite of IBM Tivoli Inc., http://www306.ibm.com/software/tivoli/
  • 14
    • 33845290727 scopus 로고    scopus 로고
    • IAM Suite of Netegrity Inc., http://www.netegrity.com/products/products_overview.cfm
  • 15
    • 33845313755 scopus 로고    scopus 로고
    • IAM Suite of Oblix Inc., http://www.oblix.com/
  • 16
    • 33845311313 scopus 로고    scopus 로고
    • IAM Suite of SunOne Inc., http://www.sun.com/software/index.jsp?cat=Identity%20Management&tab= 3
  • 17
    • 33845295590 scopus 로고    scopus 로고
    • Liberty Alliance Project-2002, www.projectliberty.org
  • 18
    • 33845295894 scopus 로고    scopus 로고
    • Update: 16 Mar. 2005
    • OASIS SAML V2.0.Information http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security#saml v20 (Update: 16 Mar. 2005)
    • OASIS SAML V2.0.Information
  • 19
    • 33845332805 scopus 로고    scopus 로고
    • Universal federation architecture
    • April
    • Netegrity white paper, "Universal Federation Architecture", April, 2004
    • (2004) Netegrity White Paper
  • 22
    • 0004225165 scopus 로고    scopus 로고
    • The intrusion detection message exchange format draft-ietf-idwg-idmef-xml-12
    • Jul. 8
    • H. Debar, D. Curry, "The Intrusion Detection Message Exchange Format draft-ietf-idwg-idmef-xml-12", IETF, Internet Draft, Jul. 8, 2004
    • (2004) IETF, Internet Draft
    • Debar, H.1    Curry, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.