Secure encryption key management as a SecaaS based on Chinese wall security policy.
Saad FehisOmar NoualiM. Tahar KechadiPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- key management
- security policies
- access control
- key management scheme
- security management
- network security
- resource constrained
- ad hoc networks
- key distribution
- digital signature
- security requirements
- wireless sensor networks
- symmetric key
- network management
- distributed systems
- security threats
- secret sharing scheme
- security services
- group communication
- secure communication
- secret key
- security protocols
- provably secure
- key establishment
- unauthorized access
- identity based cryptography
- elliptic curve
- access control policies
- encryption decryption
- security model
- diffie hellman
- security mechanisms
- end to end
- sensor networks
- private key
- data security
- access control mechanism
- energy consumption
- intrusion detection