A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Chris J. MitchellDave RushMichael WalkerPublished in: Comput. J. (1990)
Keyphrases
- security issues
- security architecture
- security requirements
- security analysis
- security management
- security level
- feature vectors
- security policies
- security model
- feature extraction
- public key encryption
- secure routing
- secure multiparty computation
- security services
- publish subscribe
- authentication protocol
- key management
- loosely coupled
- sensitive data
- feature set