Login / Signup
On the Boundaries of Trust and Security in Computing and Communications Systems
Al-Sakib Khan Pathan
Published in:
CoRR (2012)
Keyphrases
</>
trust management
security systems
intrusion detection
trust model
information security
network management
distributed systems
complex systems
security requirements
trusted computing
trust evaluation
sys tems