Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments.
Teemu KanstrénAntti EvestiPublished in: STM (2015)
Keyphrases
- trusted computing
- security services
- cloud computing
- security issues
- security requirements
- security mechanisms
- computing platform
- key management
- public key infrastructure
- computing environments
- security protocols
- security measures
- security level
- cloud storage
- trust relationships
- electronic transactions
- security architecture
- security analysis
- security model
- security management
- security properties
- information security
- cryptographic protocols
- authentication mechanism
- measurement model
- data encryption
- stream cipher
- open systems
- data security
- electronic voting
- security patterns
- identity management
- smart card
- security policies
- authentication protocol
- key agreement protocol
- access control
- encryption scheme
- sensitive data
- data center
- key exchange protocol
- integrity verification
- secure communication
- personal information
- trust management
- user authentication
- ad hoc networks
- digital signature scheme
- electronic commerce
- diffie hellman
- secure routing
- factor authentication
- digital rights management
- provably secure
- key exchange
- trust model
- resource constrained
- key agreement
- public key encryption
- electronic payment
- computing infrastructure
- mobile agent system
- cloud services
- digital signature
- public key