Integrity and security standards based on cryptography.
Dennis K. BranstadMiles E. SmidPublished in: Comput. Secur. (1982)
Keyphrases
- information security
- iso iec
- data integrity
- encryption algorithms
- trusted computing
- integrity verification
- security issues
- information flow control
- high assurance
- network security
- intrusion detection
- security mechanisms
- data confidentiality
- cryptographic algorithms
- computer security
- web services
- information systems
- sensitive data
- security policies
- international standards
- data security
- cellular automata
- security systems
- data protection
- security properties
- elliptic curve cryptography
- public key cryptography
- cryptographic protocols
- security level
- smart card
- cyber security
- information flow
- security analysis
- key management
- security requirements
- widely accepted
- data quality
- operating system
- metadata