Information Technology Security Evaluation Using CERT C Secure Coding Standard.
Taeseung LeeKwang-Woo LeeDongho WonNamje ParkPublished in: FGIT (2011)
Keyphrases
- information technology
- security issues
- security requirements
- security mechanisms
- security level
- data encryption
- security measures
- security services
- information systems
- security analysis
- key management
- security properties
- information security
- integrity verification
- security management
- security protocols
- key exchange
- security model
- data security
- key exchange protocol
- iso iec
- stream cipher
- security patterns
- intrusion detection
- identity management
- coding scheme
- encryption scheme
- digital signature scheme
- electronic voting
- diffie hellman
- mobile agent system
- rfid systems
- network security
- cryptographic protocols
- user authentication
- business processes
- cloud computing
- security policies
- access control
- sensitive data
- authentication protocol
- authentication mechanism
- public key cryptosystem
- decision makers
- emergency response