JOURNAL ARTICLE

End-to-end communications security

Kevin J. Kumpf

Year: 2006 Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Vol: 6241 Pages: 62410R-62410R   Publisher: SPIE

Abstract

The current methodologies of network communication security and in-transit data security being used within the enterprise do not adequately meet the ever growing threats from internal as well as external sources. A new approach called End-to-End Communications Security is being used to successfully close these security gaps and bring enterprises into regulatory and aduit compliance all at the same time.

Keywords:
Computer security Computer science Security service Cloud computing security Security information and event management Network security policy Information security Business Cloud computing

Metrics

1
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.11
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
IPv6, Mobility, Handover, Networks, Security
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
© 2026 ScienceGate Book Chapters — All rights reserved.