IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Dynamic Management of Security Constraints in Advanced Enterprises

Dynamic Management of Security Constraints in Advanced Enterprises
View Sample PDF
Author(s): R. Manjunath (Bangalore University, India)
Copyright: 2007
Pages: 9
Source title: Advances in Enterprise Information Technology Security
Source Author(s)/Editor(s): Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg )and Francine Herrmann (University Paul Vertaine-Metz, France)
DOI: 10.4018/978-1-59904-090-5.ch017

Purchase

View Dynamic Management of Security Constraints in Advanced Enterprises on the publisher's website for pricing and purchasing information.

Abstract

Providing security for the content that gets exchanged between physically and geographically different locations is challenging. The cost and resources to be used to meet this challenge has to be linked to the degree of security demanded by the content. In this chapter, the security associated with the transfer of the content is quantified and treated as a quality of service parameter. The user is free to select the parameter depending up on the content being transferred. As dictated by the demanding situations, a minimum agreed security would be assured for the data at the expense of the appropriate resources over the network.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom