Malware Response Naming Scheme for Security Control Service.
Shinho LeeWookhyun JungSeohyun LeeEui Tak KimPublished in: ICTC (2020)
Keyphrases
- malware detection
- identity based cryptography
- access control
- security services
- control system
- digital signature scheme
- network services
- application level
- web services
- protection scheme
- key distribution
- service management
- information security
- computer security
- intrusion detection
- elliptic curve
- authentication mechanism
- security properties
- secure communication
- authentication scheme
- service providers
- service oriented
- graphical password
- trusted third party
- private key
- security issues
- security model
- service composition
- chaotic systems
- security protocols
- human operators