Transaction Security System Extensions to the Common Cryptographic Architecture.
Don B. JohnsonGeorge M. DolanPublished in: IBM Syst. J. (1991)
Keyphrases
- security properties
- key management
- security protocols
- security architecture
- high assurance
- random number generator
- encryption scheme
- security policies
- information security
- encryption decryption
- digital rights management
- database
- smart card
- intrusion detection
- encryption key
- enterprise systems
- cryptographic protocols
- access control
- formal model
- management system
- security issues
- security requirements
- service management
- mobile payment
- cryptographic algorithms
- real time
- elliptic curve cryptography
- concurrency control
- software architecture
- public key cryptography
- secure communication
- authentication protocol
- operating system