In Whom Do We Trust - Sharing Security Events.
Jessica SteinbergerBenjamin KuhnertAnna SperottoHarald BaierAiko PrasPublished in: AIMS (2016)
Keyphrases
- security services
- trust management
- trust relationships
- trust negotiation
- trusted computing
- trust model
- intrusion detection
- information security
- event detection
- network security
- knowledge sharing
- access control
- security issues
- information sharing
- security requirements
- contractual obligations
- public key infrastructure
- cyber security
- security protocols
- computer security
- key management
- security mechanisms
- biometric systems
- statistical databases
- security policies
- sensitive data
- security analysis
- security threats
- data sharing
- personal information
- computer networks
- malicious nodes
- privacy preserving
- sensor networks
- information systems