A Security-Aware Approach to JXTA-Overlay Primitives.
Joan Arnedo-MorenoKeita MatsuoLeonard BarolliFatos XhafaPublished in: ICPP Workshops (2009)
Keyphrases
- taking care
- security issues
- access control
- information security
- low level
- computer security
- intrusion detection
- security policies
- security problems
- security mechanisms
- data mining
- information assurance
- security management
- security threats
- security systems
- security requirements
- network security
- building blocks
- neural network
- functional requirements
- security analysis
- data integrity
- security protocols
- authentication protocol
- security level
- statistical databases
- high level