Verifiable Identifiers in Middleware Security.
Ulrich LangDieter GollmannRudolf SchreinerPublished in: ACSAC (2001)
Keyphrases
- information security
- information assurance
- access control
- distributed systems
- security systems
- network security
- security policies
- security requirements
- security problems
- security protocols
- computer security
- security mechanisms
- intrusion detection
- statistical databases
- key management
- smart card
- security analysis
- security properties
- context awareness
- database
- security model
- sufficient conditions
- publish subscribe
- metadata
- security management
- security measures
- information systems