{"title":"令牌化和加密如何实现PCI DSS合规性","authors":"Branden R. Williams","doi":"10.1016/j.istr.2011.02.005","DOIUrl":null,"url":null,"abstract":"<div><p>PCI DSS tends to affect companies in ways they never imagined. It seems like the successful marketing of a few banks has put numerous cards in all of our customers’ wallets, and many prefer to use them instead of checks or cash. In this chapter, guest author Branden Williams will discuss several methods by which you can tackle this issue, ultimately leading us down a discussion of the various uses for encryption and tokenization, and how we can use those to reduce the impact that PCI DSS has on our organization.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"15 4","pages":"Pages 160-165"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2011.02.005","citationCount":"7","resultStr":"{\"title\":\"How tokenization and encryption can enable PCI DSS compliance\",\"authors\":\"Branden R. Williams\",\"doi\":\"10.1016/j.istr.2011.02.005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>PCI DSS tends to affect companies in ways they never imagined. It seems like the successful marketing of a few banks has put numerous cards in all of our customers’ wallets, and many prefer to use them instead of checks or cash. In this chapter, guest author Branden Williams will discuss several methods by which you can tackle this issue, ultimately leading us down a discussion of the various uses for encryption and tokenization, and how we can use those to reduce the impact that PCI DSS has on our organization.</p></div>\",\"PeriodicalId\":100669,\"journal\":{\"name\":\"Information Security Technical Report\",\"volume\":\"15 4\",\"pages\":\"Pages 160-165\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/j.istr.2011.02.005\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Technical Report\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1363412711000161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412711000161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
How tokenization and encryption can enable PCI DSS compliance
PCI DSS tends to affect companies in ways they never imagined. It seems like the successful marketing of a few banks has put numerous cards in all of our customers’ wallets, and many prefer to use them instead of checks or cash. In this chapter, guest author Branden Williams will discuss several methods by which you can tackle this issue, ultimately leading us down a discussion of the various uses for encryption and tokenization, and how we can use those to reduce the impact that PCI DSS has on our organization.