Security Against Impersonation Attacks in Distributed Systems.
Philip N. BrownHolly BorowskiJason R. MardenPublished in: CoRR (2017)
Keyphrases
- distributed systems
- security policies
- security mechanisms
- smart card
- security analysis
- authentication protocol
- security threats
- java card
- security protocols
- security requirements
- security problems
- cyber attacks
- security measures
- cryptographic protocols
- computer security
- security vulnerabilities
- fault tolerant
- distributed environment
- information security
- security risks
- countermeasures
- mobile agent system
- denial of service attacks
- fault tolerance
- security issues
- load balancing
- network monitoring
- chosen plaintext
- operating system
- geographically distributed
- high assurance
- access control
- distributed computing
- deadlock detection
- distributed database systems
- data replication
- mobile agents
- concurrent systems
- software architecture
- real time systems
- public key
- intelligent agents
- biometric template
- sensitive data
- dos attacks