Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach.
Dimitrios SchinianakisRubén TraperoDiomidis S. MichalopoulosBeatriz Gallego-Nicasio CrespoPublished in: WCNC (2019)
Keyphrases
- trust management
- computer networks
- intrusion detection
- network security
- social networks
- taking care
- information security
- enterprise network
- security issues
- trusted computing
- security management
- public key infrastructure
- trust model
- computer security
- security threats
- security services
- trust evaluation
- trust negotiation
- information systems
- neighboring nodes
- security requirements
- security mechanisms
- statistical databases
- security policies
- access control
- policy enforcement