{"title":"安全和审计:业务部门对安全和完整性控制的需求","authors":"Richard A. Smith, L. Chalmers, C. Wood","doi":"10.1145/800171.809638","DOIUrl":null,"url":null,"abstract":"This session presents the security and integrity needs of the business sector in the form of recommendations and design criteria. Concerns, requirements, and suggested specifications are discussed in the hopes that fifth generation designers integrate the recommendations into hardware and software.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and audit: Needs of the business sector for security and integrity controls\",\"authors\":\"Richard A. Smith, L. Chalmers, C. Wood\",\"doi\":\"10.1145/800171.809638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This session presents the security and integrity needs of the business sector in the form of recommendations and design criteria. Concerns, requirements, and suggested specifications are discussed in the hopes that fifth generation designers integrate the recommendations into hardware and software.\",\"PeriodicalId\":218138,\"journal\":{\"name\":\"ACM '84\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM '84\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800171.809638\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and audit: Needs of the business sector for security and integrity controls
This session presents the security and integrity needs of the business sector in the form of recommendations and design criteria. Concerns, requirements, and suggested specifications are discussed in the hopes that fifth generation designers integrate the recommendations into hardware and software.