Security Trust Zone in 5G networks.
Bin HanStan WongChristian MannweilerMischa DohlerHans D. SchottenPublished in: ICT (2017)
Keyphrases
- trust management
- enterprise network
- trusted computing
- intrusion detection
- access control
- public key infrastructure
- social networks
- trust model
- trust evaluation
- security requirements
- security services
- computer networks
- network security
- policy enforcement
- trust relationships
- computer security
- privacy concerns
- security policies
- cyber security
- data security
- security protocols
- heterogeneous networks
- neighboring nodes
- community structure
- trust negotiation
- information security
- network structure