Managing multi level security in a military intranet environment

Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 1999-01, Vol.18 (3), p.257-270
Hauptverfasser: von Solms, S.H., Geldenhuys, J.H.S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 270
container_issue 3
container_start_page 257
container_title Computers & security
container_volume 18
creator von Solms, S.H.
Geldenhuys, J.H.S.
description Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.
doi_str_mv 10.1016/S0167-4048(99)80069-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_207375531</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404899800698</els_id><sourcerecordid>41123231</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</originalsourceid><addsrcrecordid>eNqFkE1LAzEQhoMoWKs_QVg86WE12XyfVIpfUPGgnkM2Oy0pu9maZAv-e7etePUyw8D7vjPzIHRO8DXBRNy8j0WWDDN1qfWVwljoUh2gCVGyKkWF1SGa_EmO0UlKK4yJFEpN0N2rDXbpw7Lohjb7ooUNtEUCN0SfvwsfClt0vvXZxu2Uow2QCwgbH_vQQcin6Ghh2wRnv32KPh8fPmbP5fzt6WV2Py8dpSyXNWOCSFwvakUZMMGxphpIU9tGNFwTUlEmGLPCSg6EV0Q44QilitOq0bWkU3Sxz13H_muAlM2qH2IYV5oKSyo5p2QU8b3IxT6lCAuzjr4bTzcEmy0rs2NltiCM1mbHyqjRd7v3wfjBxkM0yXkIDhofwWXT9P6fhB-C-2-z</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207375531</pqid></control><display><type>article</type><title>Managing multi level security in a military intranet environment</title><source>Elsevier ScienceDirect Journals</source><creator>von Solms, S.H. ; Geldenhuys, J.H.S.</creator><creatorcontrib>von Solms, S.H. ; Geldenhuys, J.H.S.</creatorcontrib><description>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/S0167-4048(99)80069-8</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Authorization Applet ; baggage ; Baggage collection ; Cybersecurity ; Intelligent Agent ; Intranets ; Java ; Java Baggage Security Application ; Military communications ; Network security ; onion ; Onion Routing ; Onion Routing Proxy ; PCM</subject><ispartof>Computers &amp; security, 1999-01, Vol.18 (3), p.257-270</ispartof><rights>1999</rights><rights>Copyright Elsevier Sequoia S.A. 1999</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</citedby><cites>FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404899800698$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>von Solms, S.H.</creatorcontrib><creatorcontrib>Geldenhuys, J.H.S.</creatorcontrib><title>Managing multi level security in a military intranet environment</title><title>Computers &amp; security</title><description>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</description><subject>Authorization Applet</subject><subject>baggage</subject><subject>Baggage collection</subject><subject>Cybersecurity</subject><subject>Intelligent Agent</subject><subject>Intranets</subject><subject>Java</subject><subject>Java Baggage Security Application</subject><subject>Military communications</subject><subject>Network security</subject><subject>onion</subject><subject>Onion Routing</subject><subject>Onion Routing Proxy</subject><subject>PCM</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1999</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LAzEQhoMoWKs_QVg86WE12XyfVIpfUPGgnkM2Oy0pu9maZAv-e7etePUyw8D7vjPzIHRO8DXBRNy8j0WWDDN1qfWVwljoUh2gCVGyKkWF1SGa_EmO0UlKK4yJFEpN0N2rDXbpw7Lohjb7ooUNtEUCN0SfvwsfClt0vvXZxu2Uow2QCwgbH_vQQcin6Ghh2wRnv32KPh8fPmbP5fzt6WV2Py8dpSyXNWOCSFwvakUZMMGxphpIU9tGNFwTUlEmGLPCSg6EV0Q44QilitOq0bWkU3Sxz13H_muAlM2qH2IYV5oKSyo5p2QU8b3IxT6lCAuzjr4bTzcEmy0rs2NltiCM1mbHyqjRd7v3wfjBxkM0yXkIDhofwWXT9P6fhB-C-2-z</recordid><startdate>19990101</startdate><enddate>19990101</enddate><creator>von Solms, S.H.</creator><creator>Geldenhuys, J.H.S.</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>19990101</creationdate><title>Managing multi level security in a military intranet environment</title><author>von Solms, S.H. ; Geldenhuys, J.H.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-b446170bfb834e4650939e1dbad6d5911234644a6a75e15216c6c1338532d9b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Authorization Applet</topic><topic>baggage</topic><topic>Baggage collection</topic><topic>Cybersecurity</topic><topic>Intelligent Agent</topic><topic>Intranets</topic><topic>Java</topic><topic>Java Baggage Security Application</topic><topic>Military communications</topic><topic>Network security</topic><topic>onion</topic><topic>Onion Routing</topic><topic>Onion Routing Proxy</topic><topic>PCM</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>von Solms, S.H.</creatorcontrib><creatorcontrib>Geldenhuys, J.H.S.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>von Solms, S.H.</au><au>Geldenhuys, J.H.S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Managing multi level security in a military intranet environment</atitle><jtitle>Computers &amp; security</jtitle><date>1999-01-01</date><risdate>1999</risdate><volume>18</volume><issue>3</issue><spage>257</spage><epage>270</epage><pages>257-270</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Intranets are rapidly becoming a commonly used piece of technology in companies around the world. The military and government sectors are also not unaffected by this movement. With these two sectors in mind, security remains a very important aspect in the use of this technology. Multi level security in a military environment is achieved by making use of a number of technologies to ensure the safety of the environment. The technologies used include Onion Routing, Baggage Collection and the use of Intelligent Agents. This paper discusses how these technologies are used to form a model that manages multi level security in a military environment.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/S0167-4048(99)80069-8</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 1999-01, Vol.18 (3), p.257-270
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_207375531
source Elsevier ScienceDirect Journals
subjects Authorization Applet
baggage
Baggage collection
Cybersecurity
Intelligent Agent
Intranets
Java
Java Baggage Security Application
Military communications
Network security
onion
Onion Routing
Onion Routing Proxy
PCM
title Managing multi level security in a military intranet environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T08%3A07%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Managing%20multi%20level%20security%20in%20a%20military%20intranet%20environment&rft.jtitle=Computers%20&%20security&rft.au=von%20Solms,%20S.H.&rft.date=1999-01-01&rft.volume=18&rft.issue=3&rft.spage=257&rft.epage=270&rft.pages=257-270&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/S0167-4048(99)80069-8&rft_dat=%3Cproquest_cross%3E41123231%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207375531&rft_id=info:pmid/&rft_els_id=S0167404899800698&rfr_iscdi=true