Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem.
Bruno d'AusbourgPublished in: ESORICS (1994)
Keyphrases
- single point of failure
- security measures
- security issues
- distributed network
- computer networks
- peer to peer
- security requirements
- security management
- security threats
- remote server
- key management
- security architecture
- security level
- information security
- network security
- security mechanisms
- mobile agent system
- communication cost
- security model
- security analysis
- security properties
- advanced metering infrastructure
- rights management
- application level
- security services
- stream cipher
- cryptographic protocols
- user authentication
- wireless sensor networks
- distributed systems
- network traffic
- security protocols
- network nodes
- network management
- security policies
- intrusion detection
- private key
- data security
- secure multiparty computation
- lightweight
- authentication protocol
- key agreement protocol
- key distribution
- access control
- virtual private network
- data encryption
- intrusion detection system
- trusted computing
- distributed environment
- fault tolerant
- computing environments
- encryption scheme