On Distributed Security Transactions that Use Secure Transport Protocols.
Philippa J. BroadfootGavin LowePublished in: CSFW (2003)
Keyphrases
- secure multiparty computation
- security requirements
- concurrency control protocols
- security protocols
- cryptographic protocols
- privacy preserving
- key distribution
- key agreement protocol
- authentication protocol
- security properties
- security services
- security level
- key establishment
- key exchange
- group communication
- key management
- security issues
- security analysis
- security mechanisms
- commit protocols
- single point of failure
- application level
- diffie hellman
- rights management
- mobile agent system
- information security
- distributed systems
- smart card
- transaction processing systems
- access control
- fault tolerant
- stream cipher
- security model
- security policies
- peer to peer
- homomorphic encryption
- security measures
- electronic transactions
- trusted third party
- mutual authentication
- electronic voting
- lightweight
- distributed database systems
- encryption scheme
- public key
- multi party
- user authentication
- secret key
- sensitive data
- security management
- data encryption
- distributed environment
- fault tolerance
- authentication mechanism
- correctness criteria
- transaction management
- data security
- digital signature
- distributed databases
- trusted computing
- mobile agents
- electronic commerce
- private key