Security in a Client-Server Environment

dc.altmetrics.displaytrueen
dc.contributor.authorBernbom, Gerryen
dc.contributor.authorBruhn, Marken
dc.contributor.authorCromwell, Dennisen
dc.date.accessioned2013-07-26T15:21:50Zen
dc.date.available2013-07-26T15:21:50Zen
dc.date.issued1993-12-09en
dc.descriptionOriginally presented at CAUSE93 in San Diego, California. See also companion presentation at: http://hdl.handle.net/2022/16710en
dc.description.abstractThis paper describes the strategy adopted by Indiana University in the design and implementation of a security model for the client/server environment. The strategic initiatives which were the catalyst for this effort are presented: deployment of a high speed network, an orientation to workstation-centered computing, and a growing commitment to open-systems solutions. Details of the IU security architecture are discussed, focusing on the three components of security -- identification, authentication and authorization -- and why they are critical success factors to implementing a client/server information system. The paper identifies security problems of an open-systems and client-server environment, the technology components of a security solution, and the work done by Indiana University to supplement the immature technology in this area. The paper also makes a case for clear analysis of security exposures, and the importance evaluation security solutions in light of evolving industry standards.en
dc.identifier.urihttps://hdl.handle.net/2022/16709en
dc.language.isoen_USen
dc.titleSecurity in a Client-Server Environmenten
dc.typeTechnical Reporten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Security_Client-Server_ Environment_paper_1993.pdf
Size:
639.61 KB
Format:
Adobe Portable Document Format
If you need an accessible version of this item, please email your request to iusw@iu.edu so that they may create one and provide it to you.