Security and Protection in Information Systems: Proceedings of the Fourth IFIP TC 11 International Conference on Computer Security, IFIP/Sec '86, Monte Carlo, Monaco, 2-4 December, 1986
North-Holland, 1989 - Business & Economics - 477 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
SECURITY OF ELECTRONIC FUNDS TRANSFERS
Integrity Lock Prototype
51 other sections not shown
activities algorithm anonymity cut application attack audit auditors authentication bank banknote block capabilities checksum chipcard cipher client communications computer crime computer security computer virus CRIPT-SP cryptographic cryptosystems data base Data Encryption Standard data objects data records data set database DBMS devices digital signature disclosure disk distributed document EDP security electronic encryption ensure environment executables expert system facilities function Grissonnanche Editor hardware host identified implemented Integrity Lock key management mechanism medical secrecy method microdata microdata file modified module operating system parameters password payment systems perform person problem procedures protection protocol public key Publishers B.V. North-Holland RACF resource risk rules S-boxes Science Publishers B.V. security level Security Managers sender session specific standards subgoal superincreasing sequence Teletex terminal transaction Trojan Horse tuple untrusted update user's variables verify VSAM workstation