Security Against Impersonation Attacks in Distributed Systems.
Philip N. BrownHolly P. BorowskiJason R. MardenPublished in: IEEE Trans. Control. Netw. Syst. (2019)
Keyphrases
- distributed systems
- smart card
- security policies
- java card
- security analysis
- security mechanisms
- security threats
- authentication protocol
- security problems
- security protocols
- security requirements
- cyber attacks
- security measures
- security vulnerabilities
- mobile agent system
- computer security
- countermeasures
- information security
- distributed environment
- operating system
- cryptographic protocols
- software architecture
- security risks
- denial of service attacks
- high assurance
- chosen plaintext
- fault tolerant
- fault tolerance
- data replication
- security issues
- distributed computing
- load balancing
- network monitoring
- geographically distributed
- mobile agents
- loosely coupled
- access control
- agent technology
- distributed database systems
- real time systems
- software development environments
- intrusion detection
- biometric template
- resource constrained
- computer networks
- dos attacks
- agent based systems
- network security