A weakest-adversary security metric for network configuration security analysis.
Joseph PamulaSushil JajodiaPaul AmmannVipin SwarupPublished in: QoP (2006)
Keyphrases
- security analysis
- network configuration
- security requirements
- high security
- security properties
- security model
- smart card
- public key
- internet banking
- mutual authentication
- elliptic curve cryptography
- encryption scheme
- authentication protocol
- private key
- image encryption
- encryption algorithm
- user authentication
- neural network
- access control
- authentication scheme
- information security
- quality of service
- distributed systems