Secure Service Function Chaining in the Context of Zero Trust Security.
Leonard BradatschMarco HäberleBenjamin SteinertFrank KarglMichael MenthPublished in: LCN (2022)
Keyphrases
- security services
- security protocols
- security mechanisms
- security issues
- trusted computing
- security requirements
- key management
- personal information
- authentication mechanism
- public key infrastructure
- security level
- data encryption
- information security
- security measures
- encryption scheme
- service providers
- security architecture
- security management
- access control
- electronic voting
- electronic transactions
- security model
- application level
- data security
- context aware
- security properties
- authentication scheme
- authentication protocol
- key distribution
- public key
- trust relationships
- web services
- intrusion detection
- electronic commerce
- security patterns
- trusted third party
- public key cryptography
- resource constrained
- security analysis
- secure communication
- user authentication
- trust management