To read this content please select one of the options below:

Security architectures for network clients

Victoria Skoularidou (Systems Engineer, Department of Management Science and Technology, Athens University of Economics and Business (AUEB), Athens, Greece)
Diomidis Spinellis (Assistant Professor, Department of Management Science and Technology, Athens University of Economics and Business (AUEB), Athens, Greece)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 May 2003

2310

Abstract

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls, and virtual machines. Software implementations are the Java Sandbox, and the code signing concept. Hardware that can be used includes smart cards, and the TCPA/Palladium security initiative. Describes their most important features and provide a review and comparative study based on a number of criteria. Believes that ongoing research can empower these mechanisms for protecting network clients in a more effective way.

Keywords

Citation

Skoularidou, V. and Spinellis, D. (2003), "Security architectures for network clients", Information Management & Computer Security, Vol. 11 No. 2, pp. 84-91. https://doi.org/10.1108/09685220310468664

Publisher

:

MCB UP Ltd

Copyright © 2003, MCB UP Limited

Related articles