Keyphrases
- management system
- trust relationships
- security services
- access control
- security architecture
- trust management
- intrusion detection
- enterprise systems
- information security
- security requirements
- real time
- privacy concerns
- trusted computing
- trust model
- network security
- software architecture
- trust negotiation
- intrusion detection and prevention
- application level
- security protocols
- security analysis
- security mechanisms
- security policies
- operating system
- information systems