Login / Signup
A Proof of Security of a Mesh Security Architecture.
Doug Kuhlman
Ryan Moriarty
Tony Braskich
Steve Emeott
Mahesh V. Tripunitara
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
security architecture
security policies
access control
security model
security mechanisms
data integrity
security requirements
simulation platform
intrusion detection system
insider threat
network security
information security
multi agent
statistical databases
data protection