Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains.
Verena ZimmermannJasmin HaunschildAlina StöverNina GerberPublished in: MuC (Workshopband) (2023)
Keyphrases
- security requirements
- security issues
- security measures
- security mechanisms
- security level
- security management
- security analysis
- security properties
- security policies
- data security
- key management
- security architecture
- human experts
- access control
- user authentication
- security protocols
- high security
- data encryption
- encryption scheme
- information security
- electronic voting
- authentication protocol
- security model
- intrusion detection
- cryptographic protocols
- stream cipher
- security services
- key exchange protocol
- identity management
- authentication mechanism
- public key encryption
- computational models
- sensitive data
- integrity verification
- trusted computing
- key exchange
- authentication scheme
- cloud computing
- secure routing
- factor authentication
- secure multiparty computation
- key agreement
- intrusion detection system
- unauthorized access
- provably secure
- data integrity
- diffie hellman
- smart card
- elliptic curve
- digital signature scheme
- rfid systems
- standard model
- critical infrastructure
- human factors
- public key cryptography
- human operators
- countermeasures
- public key infrastructure
- public key
- security patterns
- key agreement protocol