Secure Network Access Using Multiple Applications of AT&T's Smart Card

1994 ◽  
Vol 73 (5) ◽  
pp. 61-72 ◽  
Author(s):  
Stephen A. Sherman ◽  
Richard Skibo ◽  
Richard S. Murray
2004 ◽  
Author(s):  
Hong Zhang ◽  
Man Yuan ◽  
Rui He ◽  
Luliang Jiang ◽  
Jian Ma ◽  
...  

Author(s):  
Yu Wang

In this chapter, we will provide a brief overview of network security and introduce essential concepts of intrusion detection and prevention and review their basic principles and guidelines. Then, we will discuss statistical approaches in practice as well as statistical opportunities, roles, and challenges in network security. Network security has become a very popular topic. A simple Google search based on the keyword “network security” showed 2.2 million items on February 29, 2008. Network security aims to protect the entire infrastructure of a computer network and its corresponding services from unauthorized access. The two key elements of network security are risk assessment and risk management. There are several fundamental components in network security: (1) security-specific infrastructures, such as hardware- and software-based firewalls and physical security approaches, (2) security polices, which include security protocols, users’ authentications, authorizations, access controls, information integrity and confidentiality, (3) detection of malicious programs, including anti-viruses, worms, or Trojan horses, and spyware or malware, and (4) intrusion detection and prevention, which encompasses network traffic surveillance and analyzing and profiling user behavior. Since the topic of network security links a great number of research areas and disciplines, we will focus on the component of intrusion detection and prevention in this book. Readers who are interested in other components or want to gain more detailed information on the entire topic may refer to Smedinghoff (1996), Curtin (1997), Garfinkel and Spafford (1997), McClure, Scambray, and Kurtz, (1999), Strebe and Perkins (2000), Bishop (2003), Maiwald (2003), Stallings (2003), Lazarevic, Ertoz, Kumar, Ozgur, & Srivastava, (2003), Bragg, Rhodes-Ousley, Strassberg (2004), McNab (2007), and Dasarathy (2008). For wireless network security, Vacca (2006) provides an essential step-by-step guide that explains the wireless-specific security challenges and tasks, and for mobile phone related intrusion detection refer to Isohara, Takemori & Sasase (2008). Finally, for an overall introduction on network security, including key tools and technologies used to secure network access, refer to Network Security Principles and Practices by Malik (2003) and Network Security Fundamentals by Laet & Schauwers (2005).


1998 ◽  
Vol 37 (03) ◽  
pp. 247-253 ◽  
Author(s):  
K. Ohe ◽  
S. Kaihara ◽  
T. Kiuchi

AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.


Author(s):  
Uwe Hansmann ◽  
Martin S. Nicklous ◽  
Thomas Schäck ◽  
Frank Seliger

1998 ◽  
Vol 1649 (1) ◽  
pp. 95-104 ◽  
Author(s):  
David T. Hartgen ◽  
Ji Youn Kim

Commercial development at 63 rural and small-town Interstate exits is quantified and related to local market wealth, size, geography, access, traffic, site competition, and other development. Five development types (gas stations, convenience stores, fast food restaurants, sit-down restaurants, and motels) are studied. The geographic information system TransCAD 3.0 is used to determine network access and local trade area characteristics. Models are then estimated for each development type using classification and regression techniques separately and in combination. Model estimates are then compared with actual development. Results show that the relationships are complex, often nonlinear; and show high correlation between development types. The findings should be useful for planning exit land use, coordinating market assessments, determining the value of land, and assessing sites for business placement.


Sign in / Sign up

Export Citation Format

Share Document