Publication detail

On the Design of Communication in Business Information Systems

OČENÁŠEK, P.

Original Title

On the Design of Communication in Business Information Systems

English Title

On the Design of Communication in Business Information Systems

Type

conference paper

Language

en

Original Abstract

This paper presents a novel approach that has been used for designing secure communication in the business information systems. The approach is based on the evolutionary approach and uses principles of genetic algorithm to "evolve" the communication protocols. The protocols can be than used for establishing secure communication as well as for client/server authentication and/or key distribution in information systems.

English abstract

This paper presents a novel approach that has been used for designing secure communication in the business information systems. The approach is based on the evolutionary approach and uses principles of genetic algorithm to "evolve" the communication protocols. The protocols can be than used for establishing secure communication as well as for client/server authentication and/or key distribution in information systems.

Keywords

Business information system, communication, design, security protocol, evolution

RIV year

2010

Released

30.09.2010

Publisher

Institute of Electrical and Electronics Engineers

Location

Chengdu

ISBN

978-1-4244-9202-2

Book

Proceedings of 2010 International Conference on Economics, Business and Management

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

98

Pages to

101

Pages count

4

BibTex


@inproceedings{BUT34401,
  author="Pavel {Očenášek}",
  title="On the Design of Communication in Business Information Systems",
  annote="This paper presents a novel approach that has been used for designing secure
communication in the business information systems. The approach is based on the
evolutionary approach and uses principles of genetic algorithm to "evolve" the
communication protocols. The protocols can be than used for establishing secure
communication as well as for client/server authentication and/or key distribution
in information systems.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="Proceedings of 2010 International Conference on Economics, Business and Management",
  chapter="34401",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2010",
  month="september",
  pages="98--101",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}