TCO-aware provisioning of information security infrastructure


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News TCO-aware provisioning of information security infrastructure
# 1  
Old 11-26-2008
TCO-aware provisioning of information security infrastructure

HPL-2008-195 TCO-aware provisioning of information security infrastructure - Robinson, Philip; Stephenson, Bryan
Keyword(s): TCO automated security infrastructure provisioning
Abstract: As IT infrastructure proliferates, higher-level security controls must become interpretable and enforceable by machines, largely without human intervention. We establish a single provisioning model and process for addressing security and the Total Cost of Ownership (TCO). The innovation is the combi ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Cybersecurity

Information Security Certification ??

Hi All I am not sure this is the right place to ask this question. I am from India ( Mumbai ) .I am in IT industry ( as Application developer / System support ) for nearly 4 years i dont have any direct security related work experience but i did work on cryptography & Access control in 2... (4 Replies)
Discussion started by: zedex
4 Replies
Login or Register to Ask a Question
gss_process_context_token(3)				     Library Functions Manual				      gss_process_context_token(3)

NAME
gss_process_context_token() - process a context to the security service SYNOPSIS
DESCRIPTION
The routine passes tokens generated by the routine to the security service. Usually, tokens are associated with either the context establishment or with per-message security services. If the tokens are associated with the context establishment, they are passed to the or routine. If the tokens are associated with the per-message security service, they are passed to the or routine. Tokens generated by the routine are passed by the routine to the security service for processing. Input Parameters context_handle Specifies the context handle on which the security service processes the token. input_token_buffer Specifies an opaque pointer to the first byte of the token to be processed. Output Parameters minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. Consistency checks performed on the input_token parameter failed. The routine failed. See the minor_status parameter return value for more information. The supplied context handle did not refer to a valid context. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_accept_sec_context(3), gss_delete_sec_context(3), gss_init_sec_context(3), gss_verify_mic(3), gss_unseal(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_process_context_token(3)