A Security Transaction Model Based on HTLC.
Xiaochuan HeChaoyue TanYongtang WuYuling ChenPublished in: iThings/GreenCom/CPSCom/SmartData/Cybermatics (2022)
Keyphrases
- information security
- database
- access control
- security requirements
- information assurance
- security threats
- security mechanisms
- multilevel secure
- security problems
- security systems
- computer security
- security issues
- security policies
- transaction processing
- high security
- network security
- security model
- key management
- statistical databases
- security analysis
- security protocols
- data security
- distributed database systems
- fully unsupervised
- transaction management
- computer networks
- security services
- information systems
- functional requirements
- mobile payment
- data mining