Security Verification of Low-Trust Architectures.
Qinhan TanYonathan FissehaShibo ChenLauren BiernackiJean-Baptiste JeanninSharad MalikTodd M. AustinPublished in: CCS (2023)
Keyphrases
- high security
- trust management
- security services
- integrity verification
- trust negotiation
- access control
- trusted computing
- information security
- trust relationships
- security policies
- policy enforcement
- security issues
- public key infrastructure
- cryptographic protocols
- java card
- trust model
- trust evaluation
- computer security
- network security
- model checking
- privacy concerns
- enterprise network
- key management
- functional requirements
- security requirements
- information systems
- security level
- image encryption
- formal methods
- internet banking
- intrusion detection
- statistical databases