default search action
Information Security Technical Report, Volume 1
Volume 1, Number 1, 1996
- Gary Hardy:
Introduction. 1-3 - John Leach:
TTP concepts. 10-18 - Pieter van Dijken:
Business requirements for secure electronic communications. 19-25 - Nanette Di Tosto:
Requirements for a trusted global public key initiative. 26-31 - David Herson:
Ethical trusted third party services - A new security approach. 32-33 - Nigel Hickson:
DTI views on the provision of encryption services on public networks. 34-39 - Andrew Edwards:
Bolero - A TTP project for the shipping industry. 40-45 - Richard Winsborrow:
EBridge - A TTP project for business registers. 46-51 - Jan Van Auseloos:
Responsibilities of TTPs in trusted networks. 52-56 - Peter Landrock:
Practical experiences with TTP schemes. 57-62 - Chris J. Mitchell:
The royal holloway TTP-based key escrow scheme. 63-69
Volume 1, Number 2, 1996
- Gary Hardy:
Introduction. 1-2 - Mike Horrell:
The security of distributed systems - An overview. 10-16 - Simon Oxley:
Securing a distributed environment - A practical case study. 17-28 - Keith Girt:
Managing access rights in the distributed world. 29-35 - Joe Galsworthy:
Information protection and data back-up in a distributed environment. 36-45 - Gary Hardy:
The truth behind single sign-on. 46-55 - Belinda Fairthorne:
Security in CORBA distributed object systems. 56-63 - Opening up business securely. 64-71
Volume 1, Number 3, 1996
- Gary Hardy:
Introduction. 1-2 - Bill Pepper:
Trends in outsourcing. 8-10 - John A. Blackley, John Leach:
Security considerations in outsourcing IT services. 11-17 - Tom Peltier:
The risk of allowing outside staff access to your information systems. 18-28 - John Greenland:
A vendor's view. 29-32 - Nigel K. Iyer, Richard T. Kusnierz:
You can outsource many activities but not fraud! 33-37 - Bill Pepper:
Obtaining assurance about your security. 38-47 - Bill Pepper:
Security service level agreements for outsourced security functions. 48-50 - Sandra Honess:
Outsourcing - A legal perspective on contract critical success factors. 57-58 - Bill Pepper:
Information security standards for outsourcing. 59-61
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.