An Empirical Analysis of HTTPS Configuration Security.
Camelia SimoiuWilson NguyenZakir DurumericPublished in: CoRR (2021)
Keyphrases
- information security
- security policies
- security requirements
- intrusion detection
- key management
- information assurance
- high security
- security level
- security analysis
- computer security
- security issues
- access control
- security mechanisms
- risk analysis
- statistical databases
- data security
- security systems
- security measures
- sensitive data
- case study
- security model
- network security
- cryptographic protocols
- security problems
- optimal configuration
- smart card