Paper
18 April 2006 End-to-end communications security
Author Affiliations +
Abstract
The current methodologies of network communication security and in-transit data security being used within the enterprise do not adequately meet the ever growing threats from internal as well as external sources. A new approach called End-to-End Communications Security is being used to successfully close these security gaps and bring enterprises into regulatory and aduit compliance all at the same time.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kevin J. Kumpf "End-to-end communications security", Proc. SPIE 6241, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, 62410R (18 April 2006); https://doi.org/10.1117/12.663453
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Information security

Information technology

Data communications

Solid state lighting

Control systems

RELATED CONTENT


Back to Top