NotesFAQContact Us
Collection
Advanced
Search Tips
Descriptor
Computer Security1
Confidentiality1
Internet1
Source
Internet Research1
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing one result Save | Export
Peer reviewed Peer reviewed
Liddy, Carrie – Internet Research, 1996
Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…
Descriptors: Computer Security, Confidentiality, Internet