8. Security
The worldwide spread of the Web and its use for commercial applications have highlighted the importance of security issues in a widely open network environment such as the Web. As a reminder, in general, system security results from the implementation of :
an integrity policy for each system to ensure there are no security holes;
authentication mechanisms, which guarantee the identity of users or other entities on the network;
access control mechanisms to ensure that only authorized operations on network objects are carried out;
confidentiality techniques to ensure that data transmitted over the network remains secret.
8.1 Security...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Software technologies and System architectures
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Security
Bibliography
Works
Websites
Internet Drafts http://www.ietf.org
Python http://www.python.org
Organizations
World Wide Web Consortium W3C http://www.w3.org
Organisation européenne pour la recherche nucléaire CERN http://public.web.cern.ch
Internet Software Consortium ISC http://www.isc.org
European Computer Manufacturers Association ECMA http://www.ecma.ch
Internet Corporation Assigned names and Numbers ICANN http://www.icann.org...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference