Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

View constraints: an interpretation of integrity constraints for security

Conference Paper
Publication Date:
1997
abstract:
Security is seen as fondamental to S.W.I.F.T.'s business, second only to network availability. The security infrastructure in terms of organisation, direction, processes and tools, must be appropriate. The world as we know it is changing rapidly as technology marches forward and as the modern business world expands to take advantage of the new technology. S.W.I.F.T. intends to face these challenges head on. This document introduces the company's strategic plans in the important area of Security and outlines six new projects which will commence this year.
Iris type:
04.01 Contributo in Atti di convegno
Keywords:
SWIFT; Financial transactions; Security architecture; Security awareness; Public key infrastructure; Security strategy; Policies; Standards; Access control; Risk assessment; Business process security
List of contributors:
Asirelli, Patrizia
Handle:
https://iris.cnr.it/handle/20.500.14243/366715
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)