Implementation of Security Functions into File Transfer, Access and Management Protocol.
Hua ChangOstap MonkewichWilliam A. McCrumPublished in: IFIP Congress (2) (1992)
Keyphrases
- file transfer
- access control
- cryptographic protocols
- network management
- role based access control
- management system
- lightweight
- security model
- directory service
- information systems
- security issues
- protocol specification
- network security
- contractual obligations
- security policies
- access requests
- key exchange protocol
- key agreement protocol
- physical layer
- intrusion detection
- rfid systems
- communication protocols
- information security
- information management
- security requirements
- security properties
- security management
- provably secure
- authentication protocol
- security protocols
- security analysis
- knowledge management