Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES).
David ArsenaultArun SoodYih HuangPublished in: ARES (2007)
Keyphrases
- intrusion detection
- security measures
- security issues
- security requirements
- trusted computing
- network security
- security level
- intrusion detection system
- security mechanisms
- security architecture
- key management
- security management
- information security
- cryptographic protocols
- data encryption
- key exchange protocol
- clustering algorithm
- security policies
- security analysis
- security protocols
- electronic voting
- key agreement protocol
- intrusion detection and prevention
- security properties
- stream cipher
- authentication scheme
- data security
- user authentication
- sensitive data
- authentication protocol
- authentication mechanism
- key agreement
- diffie hellman
- advanced encryption standard
- public key encryption
- access control
- anomaly detection
- previously mentioned
- integrity verification
- security services
- random number generator
- protection scheme
- security patterns
- malicious users
- identity management
- computing platform
- low cost
- key exchange
- rfid systems
- security threats
- mobile agent system
- secure communication
- user privacy
- digital signature scheme
- protection schemes
- secure multiparty computation
- key establishment
- key distribution
- cryptographic algorithms
- private key
- denial of service attacks
- encryption scheme
- rfid tags
- standard model
- smart card
- encryption algorithms
- factor authentication
- operating system
- computer systems