Abstracts - faqs.org

Abstracts

Science and technology

Search abstracts:
Abstracts » Science and technology

Guarding against Internet intruders

Article Abstract:

Hackers on the Internet present research institutions with the dilemma of protecting their systems from damage and intrusion while allowing the open exchange of information. Ad hoc security measures such as one-time passwords and fire walls make communication difficult, defeating the system's purpose.

Author: Germain, Ellen
Publisher: American Association for the Advancement of Science
Publication Name: Science
Subject: Science and technology
ISSN: 0036-8075
Year: 1995
Computer networks, Prevention, Computer crimes

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Security schemes aspire to no-fuss system protection

Article Abstract:

Computer scientists are trying to devise new security methods with fewer drawbacks for users and managers. One method uses artificial intelligence techniques to identify intrusions. Another devises software forensics techniques to identify authors of computer programs.

Author: Mann, Charles C.
Publisher: American Association for the Advancement of Science
Publication Name: Science
Subject: Science and technology
ISSN: 0036-8075
Year: 1995
Internet security

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Fast lanes on the Internet

Article Abstract:

Researchers are increasingly exploring strategies that would provide faster Internet access to people who need it most. Strategies under consideration include providing 'fast lanes' and even 'private roads' for scientific and commercial traffic.

Author: Germain, Ellen
Publisher: American Association for the Advancement of Science
Publication Name: Science
Subject: Science and technology
ISSN: 0036-8075
Year: 1996
Management, Communications protocols, Transmission speed

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Safety and security measures, Internet, Methods, Access control (Computers), Computer access control
Similar abstracts:
  • Abstracts: Lord of the rings: GroES structure. From the cradle to the grave: ring complexes in the life of a protein. To fold or not to fold...
  • Abstracts: Composite materials edge into mainstream construction. Securing the stone. Tall buildings triumph
  • Abstracts: Technology assessment in the Danish socio-political context. Policy analysis at the US Office of Technology Assessment
  • Abstracts: Strategic technology assessment, future products and competitive advantage. TA positions and TA storylines: towards a social constructionist framework of technology assessment
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.