Items Quantity Price / 1

X View cart
Lorem ipsum thumb
Lorem ipsum thumb
Lorem ipsum thumb
Lorem ipsum thumb
thumb

Architecting a Secure Enterprise Data Sharing Environment to the Edge

8000.0
- +
Add to wishlist

This paper analyzes secure data sharing outside the security domain. There is a high demand for accessing multiple levels of sensitive data at the edge; however the threat at that location is higher compared to the core enterprise environment. This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical user while protecting the data and the information systems from intruders and malware. The new Enterprise Architecture needs to eliminate the stovepipe architectures and open the doors to share information across traditional and non-traditional domain boundaries.

Tell friends

Technology

JAVA
Description
This paper analyzes secure data sharing outside the security domain. There is a high demand for accessing multiple levels of sensitive data at the edge; however the threat at that location is higher compared to the core enterprise environment. This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical user while protecting the data and the information systems from intruders and malware. The new Enterprise Architecture needs to eliminate the stovepipe architectures and open the doors to share information across traditional and non-traditional domain boundaries.
Description

http://ieeexplore.ieee.org/document/5929095/

Contact us

Subscribe to our news

Please fill the field before continuing

Rectus Infotech Pvt. Ltd. publishes a variety of newsletters and other email alerts to keep you updated on everything important happening in related to software technology field.