Login / Signup
An Approach for the Analysis of Security Standards for Authentication in Distributed Systems.
H. A. Eneh
Orhan Gemikonakli
Published in:
WOSIS (2005)
Keyphrases
</>
distributed systems
security policies
distributed environment
fault tolerant
geographically distributed
distributed computing
load balancing
security issues
operating system
intrusion detection
distributed databases
case study
fault tolerance
access control
security requirements
loosely coupled
real time systems