Verification of the security of a secure network component.
Edward A. SchneiderPublished in: ACSAC (1991)
Keyphrases
- security measures
- cryptographic protocols
- high security
- integrity verification
- security issues
- security requirements
- security architecture
- security threats
- security mechanisms
- security level
- countermeasures
- security management
- network structure
- application level
- key management
- information security
- stream cipher
- security protocols
- network management
- access control
- identity management
- data encryption
- sensitive data
- security policies
- data security
- security analysis
- java card
- electronic voting
- intrusion detection
- security model
- high assurance
- key agreement
- digital signature scheme
- network security
- network traffic
- peer to peer
- mobile agent system
- image encryption
- security services
- digital rights management
- user authentication
- wireless sensor networks
- resource constrained
- smart card
- virtual private network