IT convergence security
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chang, Hangbae | - |
dc.contributor.author | Kim, Jongsung | - |
dc.contributor.author | Park, Jonghyuk | - |
dc.date.available | 2020-10-20T01:01:05Z | - |
dc.date.issued | 2014-04 | - |
dc.identifier.issn | 0956-5515 | - |
dc.identifier.issn | 1572-8145 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/43358 | - |
dc.description.abstract | A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for pervasive computing environments. Security convergence refers to the convergence of two historically distinct security functions - physical security and information security - within enterprises; both are integral parts of any coherent risk management program. In this special issue, we have discussed current IT-Converged security issues, security policy and new security services which will lead to successful transfer smart space which is a new paradigm of future. © 2013 Springer Science+Business Media New York. | - |
dc.format.extent | 3 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Kluwer Academic Publishers | - |
dc.title | IT convergence security | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/s10845-013-0741-2 | - |
dc.identifier.bibliographicCitation | Journal of Intelligent Manufacturing, v.25, no.2, pp 213 - 215 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000332668100001 | - |
dc.identifier.scopusid | 2-s2.0-84896387812 | - |
dc.citation.endPage | 215 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 213 | - |
dc.citation.title | Journal of Intelligent Manufacturing | - |
dc.citation.volume | 25 | - |
dc.type.docType | Review | - |
dc.publisher.location | 네델란드 | - |
dc.subject.keywordAuthor | Human factor security | - |
dc.subject.keywordAuthor | Safety and security | - |
dc.subject.keywordAuthor | Security convergence | - |
dc.subject.keywordAuthor | Security model and practice | - |
dc.subject.keywordPlus | Information management | - |
dc.subject.keywordPlus | Information technology | - |
dc.subject.keywordPlus | Risk management | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Communication service | - |
dc.subject.keywordPlus | Integration of security | - |
dc.subject.keywordPlus | Pervasive computing environment | - |
dc.subject.keywordPlus | Risk management program | - |
dc.subject.keywordPlus | Safety and securities | - |
dc.subject.keywordPlus | Security convergence | - |
dc.subject.keywordPlus | Security functions | - |
dc.subject.keywordPlus | Security model | - |
dc.subject.keywordPlus | Ubiquitous computing | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Engineering, Manufacturing | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.