Proof of outsourced encryption: cross verification of security service level agreement.
Sultan AlasmariWeichao WangTuanfa QinYu WangPublished in: CCF Trans. Netw. (2020)
Keyphrases
- high security
- integrity verification
- service level agreements
- cryptographic protocols
- image encryption
- encryption algorithms
- security analysis
- security properties
- service providers
- third party
- encryption scheme
- encryption decryption
- encrypted data
- encryption algorithm
- cloud computing
- key management
- sensitive data
- security issues
- service level
- virtual private network
- security requirements
- access control
- grid services
- network security
- smart card
- information systems
- databases
- real time
- security protocols
- security policies
- intrusion detection
- supply chain
- mobile devices
- database