Abstract
This chapter attempts to compare the security solutions that have been reviewed in the previous chapters. Comparison of security solutions can be difficult because the designers had different motives, and aimed at solving particular requirements. The solutions are therefore compared in a number of different ways [8]:
-
1.
Categorizing the type of solution;
-
2.
Positioning in the networking model;
-
3.
Security services provided;
-
4.
Cryptographic primitives used;
-
5.
Applications and availability;
-
6.
Standardization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ashley, P., Vandenwauver, M. (1999). Comparison of the Security Solutions. In: Practical Intranet Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-5609-1_10
Download citation
DOI: https://doi.org/10.1007/978-1-4615-5609-1_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-7566-1
Online ISBN: 978-1-4615-5609-1
eBook Packages: Springer Book Archive