Audit and backup procedures for hardware security modules.
Túlio Cicero Salvaro de SouzaJean Everson MartinaRicardo Felipe CustódioPublished in: IDtrust (2008)
Keyphrases
- intrusion detection
- random number generator
- hardware and software
- low cost
- network security
- information security
- security policies
- real time
- computer security
- anomaly detection
- access control
- security problems
- security systems
- hardware implementation
- security issues
- database
- security patterns
- security threats
- high availability
- security analysis
- application level
- security requirements
- statistical databases
- computing systems
- data acquisition
- security mechanisms
- data mining techniques
- security protocols
- security properties
- modular structure
- functional units