Security-Informed Safety: If It's Not Secure, It's Not Safe.
Robin E. BloomfieldKateryna NetkachovaRobert J. StroudPublished in: SERENE (2013)
Keyphrases
- security issues
- security requirements
- security measures
- security mechanisms
- security level
- security analysis
- security management
- security protocols
- data encryption
- security properties
- security architecture
- cryptographic protocols
- user authentication
- security services
- stream cipher
- security model
- key management
- data security
- authentication protocol
- sensitive data
- security patterns
- information security
- authentication mechanism
- integrity verification
- electronic voting
- key exchange protocol
- digital rights management
- encryption scheme
- digital signature scheme
- access control
- diffie hellman
- key distribution
- smart card
- private key
- authentication scheme
- public key cryptosystem
- mobile agent system
- secure routing
- key agreement protocol
- security policies
- countermeasures
- chosen plaintext
- public key encryption
- secure multiparty computation
- covert channel
- key agreement
- secret key
- previously mentioned
- key management scheme
- identity management
- trusted computing
- key exchange
- information leakage
- key establishment
- digital signature
- factor authentication
- electronic payment