CROWN-ST: A Security and Trustworthiness Architecture for CROWN.
Qin LiJianxin LiJinpeng HuaiXingang LiuChunming HuPublished in: e-Science (2006)
Keyphrases
- information security
- security architecture
- management system
- real time
- security requirements
- security policies
- digital rights management
- security level
- security issues
- statistical databases
- highly distributed
- software architecture
- intrusion detection
- service management
- application level
- enterprise systems
- security threats
- communication protocols
- human operators
- security systems
- security protocols
- security mechanisms
- rfid tags
- network security
- ad hoc networks
- information systems