Robustly secure computer systems: a new security paradigm of system discontinuity.
Jon A. SolworthPublished in: NSPW (2007)
Keyphrases
- computer systems
- computer security
- security requirements
- security measures
- security issues
- information processing systems
- security mechanisms
- security level
- operating system
- key management
- data processing
- security management
- information security
- security properties
- cyber attacks
- sensitive data
- information systems
- security protocols
- computing systems
- data encryption
- security services
- cryptographic protocols
- security analysis
- authentication mechanism
- user authentication
- security model
- trusted computing
- stream cipher
- key agreement protocol
- intrusion detection system
- authentication protocol
- encryption scheme
- security patterns
- communication systems
- security policies
- key distribution
- integrity verification
- computer technology
- human beings
- private key
- smart card
- high end
- computer networks
- computer hardware
- access control
- key exchange protocol
- computer architecture
- countermeasures
- diffie hellman
- network security
- public key
- databases
- resource constrained
- cloud computing
- intrusion detection
- standard model
- sensitive information