How to exchange security events? Overview and evaluation of formats and protocols.
Jessica SteinbergerAnna SperottoMario GollingHarald BaierPublished in: IM (2015)
Keyphrases
- contractual obligations
- security protocols
- intrusion detection
- access control
- network security
- security policies
- key agreement protocol
- security properties
- human activities
- key exchange
- information systems
- authentication protocol
- application level
- key management
- secure multiparty computation
- cryptographic protocols
- key distribution
- security requirements
- statistical databases
- information security
- sensor networks