Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing.
Sultan AlasmariWeichao WangTuanfa QinYu WangPublished in: DSC (2019)
Keyphrases
- encryption algorithms
- encryption scheme
- security properties
- key management
- encryption decryption
- encryption algorithm
- data encryption
- access control
- digital rights management
- virtual private network
- security analysis
- information systems
- secret key
- security requirements
- image encryption
- security protocols
- service providers
- resource management
- information security
- third party
- quality of service
- intrusion detection
- public key
- security issues
- network security
- service level agreements
- business process
- case study