Security Analysis of Software Defined Networking Applications for Monitoring and Measurement: sFlow and BigTap.
Pascal DauerRahamatullah KhondokerRonald MarxKpatcha M. BayarouPublished in: CFI (2015)
Keyphrases
- security analysis
- security requirements
- image encryption
- smart card
- public key
- high security
- software systems
- software development
- authentication protocol
- software architecture
- real time
- peer to peer
- user authentication
- computer systems
- authentication scheme
- access control
- source code
- query processing
- security properties
- web services