Login / Signup

A Case for Practical Configuration Management Using Hardware-based Security Tokens.

Tim LackorzynskiMax OstermannStefan KöpsellHermann Härtig
Published in: CoRR (2022)
Keyphrases
  • configuration management
  • network management
  • security policies
  • low cost
  • real world
  • real time
  • information security
  • trusted computing
  • random number generator
  • computer systems
  • network security
  • reinforcement learning