Redrawing the Security Perimeter of a Trusted System.
Daniel F. SterneGlenn S. BensonHomayoon TajalliPublished in: CSFW (1994)
Keyphrases
- network connection
- trusted computing
- information security
- statistical databases
- computer security
- security issues
- intrusion detection
- trust relationships
- network security
- security requirements
- trusted platform module
- security problems
- security level
- access control
- data mining
- security mechanisms
- security systems
- network management
- security policies
- security threats
- human operators
- biometric systems
- data security
- computing environments
- quadtree
- security measures
- distributed environment