PUMA
Istituto di Scienza e Tecnologie dell'Informazione     
Asirelli P. View constraints: an interpretation of integrity constraints for security. In: IFIP - Integrity and Internal Control in Information Systems, Vol. 1: Increasing the confidence in information systems : proceedings First Working Conference on Integrity and Internal Control in Information Systems (Zurich, Switzerland 1997, 1997). Proceedings, pp. 237 - 252. Sushil Jajodia, William List, Graeme McGregor, Leon Strous (eds.). Chapman & Hall, 1997.
 
 
Abstract
(English)
Security is seen as fondamental to S.W.I.F.T.'s business, second only to network availability. The security infrastructure in terms of organisation, direction, processes and tools, must be appropriate. The world as we know it is changing rapidly as technology marches forward and as the modern business world expands to take advantage of the new technology. S.W.I.F.T. intends to face these challenges head on. This document introduces the company's strategic plans in the important area of Security and outlines six new projects which will commence this year.
Subject SWIFT
Financial transactions
Security architecture
Security awareness
Public key infrastructure
Security strategy
Policies
Standards
Access control
Risk assessment
Business process security


Icona documento 1) Download Document PDF


Icona documento Open access Icona documento Restricted Icona documento Private

 


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional