The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know
Ranjan PalPan HuiPublished in: CoRR (2012)
Keyphrases
- security mechanisms
- security issues
- security requirements
- electronic payment
- cyber security
- security measures
- access control
- security level
- security services
- security protocols
- security properties
- information security
- security management
- key management
- security policies
- security architecture
- resource constrained
- cyber defense
- security model
- open source software
- identity theft
- cyber crime
- electronic voting
- data security
- cryptographic protocols
- open source
- security analysis
- smart card
- user authentication
- electronic commerce
- digital signature
- key agreement protocol
- encryption scheme
- authentication protocol
- countermeasures
- network security
- data encryption
- sensitive data
- mobile agent system
- diffie hellman
- key exchange
- software development
- key exchange protocol
- intrusion detection
- digital signature scheme
- stream cipher
- cyber attacks
- digital rights management
- trusted computing
- authentication scheme
- business activities
- public key infrastructure
- public key cryptography
- cyber physical systems
- identity management
- rfid systems
- authentication mechanism
- integrity verification
- standard model
- public key encryption