Autonomic security for zero trust networks.
Dayna EidleSi Ya NiCasimer DeCusatisAnthony SagerPublished in: UEMCON (2017)
Keyphrases
- trust management
- intrusion detection
- trust negotiation
- trust model
- trusted computing
- social networks
- access control
- security services
- security policies
- network security
- information security
- security issues
- public key infrastructure
- trust relationships
- complex networks
- open systems
- information flows
- enterprise network
- security protocols
- computer security
- security mechanisms
- privacy concerns
- security threats
- data security
- neighboring nodes
- trust evaluation
- biometric systems