PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A New Electronic Commerce Architecture in the Cloud
Journal of Electronic Commerce in Organizations
Hi-index | 0.00 |
One of the most common problems associated with network security is access control. Access control is the key to all aspects of security, and it is a point that should be well considered by any security team. A common misconception about access control is that is begins and ends with locked doors, and this is sadly mistaken. Access control limits access to specific area of buildings, which house network servers, offices, terminals, and a host of other devices and data that must be protected. PKI would be useful to the Security Professional, as it creates a Web of Trust between all users on the network, and when that trust is violated, only then does the security team have to jump into action. This technique is being used within the medical field and in many research and development departments across the United States, but is not currently in place in the typical office environment. This method would enhance the overall security of a given office network, provide the security teams with an easier network to maintain, and speed up the flow of data within the office environment.