Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

To Serve and Protect: Reconciling Information Protection with LAN Environments

To Serve and Protect: Reconciling Information Protection with LAN Environments There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

To Serve and Protect: Reconciling Information Protection with LAN Environments

Loading next page...
 
/lp/emerald-publishing/to-serve-and-protect-reconciling-information-protection-with-lan-PRMZbqU0rT

References (2)

Publisher
Emerald Publishing
Copyright
Copyright © 1994 MCB UP Ltd. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685229410792934
Publisher site
See Article on Publisher Site

Abstract

There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Aug 1, 1994

Keywords: Data security; Information; Local area networks

There are no references for this article.