Security and Personalization

  • Jeffrey Haas


This chapter explains why securing an intranet is important and outlines a variety of approaches that can be taken. Once the decision about security has been made, you’ll likely find that the personalization issue has simultaneously been decided. This is because the user identification process inherent in a security authorization scheme will naturally extend to customizing that user’s experience according to their security profile or other extended settings. Then, when basic customization is occurring, it’s not a very significant theoretical step towards complete personalization (by either the system or the users themselves).


Smart Card Security Policy Intrusion Detection System Certificate Authority Virtual Private Networking 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Apress 2003

Authors and Affiliations

  • Jeffrey Haas

There are no affiliations available

Personalised recommendations