When trust defies common security sense.
Patricia A. H. WilliamsPublished in: Health Informatics J. (2008)
Keyphrases
- security services
- trusted computing
- trust management
- trust relationships
- trust model
- trust negotiation
- public key infrastructure
- network security
- security policies
- security issues
- access control
- trust evaluation
- information security
- security systems
- security level
- security problems
- security management
- security requirements
- open systems
- functional requirements
- privacy concerns
- statistical databases
- elliptic curve
- security protocols
- security mechanisms
- encryption scheme
- security measures
- internet banking
- electronic transactions
- policy enforcement