z-logo
Premium
Computer security
Author(s) -
Gollmann Dieter
Publication year - 2010
Publication title -
wiley interdisciplinary reviews: computational statistics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.693
H-Index - 38
eISSN - 1939-0068
pISSN - 1939-5108
DOI - 10.1002/wics.106
Subject(s) - computer science , computer security model , computer security , enforcement , context (archaeology) , security policy , focus (optics) , security through obscurity , security service , network security policy , cloud computing security , network security , security information and event management , information security , political science , law , cloud computing , operating system , paleontology , physics , optics , biology
Computer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies. We will put various enforcement mechanisms into context with the policies and the IT architectures they were originally designed for. We will also briefly touch on network security and conclude with remarks on security evaluation. Copyright © 2010 John Wiley & Sons, Inc. This article is categorized under: Algorithms and Computational Methods > Networks and Security

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here