Managing multi level security in a military intranet environment
Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security...
Gespeichert in:
Veröffentlicht in: | Computers & security 1999-01, Vol.18 (3), p.257-270 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 270 |
---|---|
container_issue | 3 |
container_start_page | 257 |
container_title | Computers & security |
container_volume | 18 |
creator | von Solms, S.H. Geldenhuys, J.H.S. |
description | Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment. |
doi_str_mv | 10.1016/S0167-4048(99)80069-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_207375531</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404899800698</els_id><sourcerecordid>41123231</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</originalsourceid><addsrcrecordid>eNqFkE1LAzEQhoMoWKs_QVg86WE12XyfVIpfUPGgnkM2Oy0pu9maZAv-e7etePUyw8D7vjPzIHRO8DXBRNy8j0WWDDN1qfWVwljoUh2gCVGyKkWF1SGa_EmO0UlKK4yJFEpN0N2rDXbpw7Lohjb7ooUNtEUCN0SfvwsfClt0vvXZxu2Uow2QCwgbH_vQQcin6Ghh2wRnv32KPh8fPmbP5fzt6WV2Py8dpSyXNWOCSFwvakUZMMGxphpIU9tGNFwTUlEmGLPCSg6EV0Q44QilitOq0bWkU3Sxz13H_muAlM2qH2IYV5oKSyo5p2QU8b3IxT6lCAuzjr4bTzcEmy0rs2NltiCM1mbHyqjRd7v3wfjBxkM0yXkIDhofwWXT9P6fhB-C-2-z</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207375531</pqid></control><display><type>article</type><title>Managing multi level security in a military intranet environment</title><source>Elsevier ScienceDirect Journals</source><creator>von Solms, S.H. ; Geldenhuys, J.H.S.</creator><creatorcontrib>von Solms, S.H. ; Geldenhuys, J.H.S.</creatorcontrib><description>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/S0167-4048(99)80069-8</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Authorization Applet ; baggage ; Baggage collection ; Cybersecurity ; Intelligent Agent ; Intranets ; Java ; Java Baggage Security Application ; Military communications ; Network security ; onion ; Onion Routing ; Onion Routing Proxy ; PCM</subject><ispartof>Computers & security, 1999-01, Vol.18 (3), p.257-270</ispartof><rights>1999</rights><rights>Copyright Elsevier Sequoia S.A. 1999</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</citedby><cites>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404899800698$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>von Solms, S.H.</creatorcontrib><creatorcontrib>Geldenhuys, J.H.S.</creatorcontrib><title>Managing multi level security in a military intranet environment</title><title>Computers & security</title><description>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</description><subject>Authorization Applet</subject><subject>baggage</subject><subject>Baggage collection</subject><subject>Cybersecurity</subject><subject>Intelligent Agent</subject><subject>Intranets</subject><subject>Java</subject><subject>Java Baggage Security Application</subject><subject>Military communications</subject><subject>Network security</subject><subject>onion</subject><subject>Onion Routing</subject><subject>Onion Routing Proxy</subject><subject>PCM</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LAzEQhoMoWKs_QVg86WE12XyfVIpfUPGgnkM2Oy0pu9maZAv-e7etePUyw8D7vjPzIHRO8DXBRNy8j0WWDDN1qfWVwljoUh2gCVGyKkWF1SGa_EmO0UlKK4yJFEpN0N2rDXbpw7Lohjb7ooUNtEUCN0SfvwsfClt0vvXZxu2Uow2QCwgbH_vQQcin6Ghh2wRnv32KPh8fPmbP5fzt6WV2Py8dpSyXNWOCSFwvakUZMMGxphpIU9tGNFwTUlEmGLPCSg6EV0Q44QilitOq0bWkU3Sxz13H_muAlM2qH2IYV5oKSyo5p2QU8b3IxT6lCAuzjr4bTzcEmy0rs2NltiCM1mbHyqjRd7v3wfjBxkM0yXkIDhofwWXT9P6fhB-C-2-z</recordid><startdate>19990101</startdate><enddate>19990101</enddate><creator>von Solms, S.H.</creator><creator>Geldenhuys, J.H.S.</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>19990101</creationdate><title>Managing multi level security in a military intranet environment</title><author>von Solms, S.H. ; Geldenhuys, J.H.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Authorization Applet</topic><topic>baggage</topic><topic>Baggage collection</topic><topic>Cybersecurity</topic><topic>Intelligent Agent</topic><topic>Intranets</topic><topic>Java</topic><topic>Java Baggage Security Application</topic><topic>Military communications</topic><topic>Network security</topic><topic>onion</topic><topic>Onion Routing</topic><topic>Onion Routing Proxy</topic><topic>PCM</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>von Solms, S.H.</creatorcontrib><creatorcontrib>Geldenhuys, J.H.S.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>von Solms, S.H.</au><au>Geldenhuys, J.H.S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Managing multi level security in a military intranet environment</atitle><jtitle>Computers & security</jtitle><date>1999-01-01</date><risdate>1999</risdate><volume>18</volume><issue>3</issue><spage>257</spage><epage>270</epage><pages>257-270</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/S0167-4048(99)80069-8</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 1999-01, Vol.18 (3), p.257-270 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_207375531 |
source | Elsevier ScienceDirect Journals |
subjects | Authorization Applet baggage Baggage collection Cybersecurity Intelligent Agent Intranets Java Java Baggage Security Application Military communications Network security onion Onion Routing Onion Routing Proxy PCM |
title | Managing multi level security in a military intranet environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T08%3A07%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Managing%20multi%20level%20security%20in%20a%20military%20intranet%20environment&rft.jtitle=Computers%20&%20security&rft.au=von%20Solms,%20S.H.&rft.date=1999-01-01&rft.volume=18&rft.issue=3&rft.spage=257&rft.epage=270&rft.pages=257-270&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/S0167-4048(99)80069-8&rft_dat=%3Cproquest_cross%3E41123231%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207375531&rft_id=info:pmid/&rft_els_id=S0167404899800698&rfr_iscdi=true |