To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Shamal FailyIvan FlechaisPublished in: NSPW (2010)
Keyphrases
- security measures
- security requirements
- security patterns
- security issues
- high assurance
- security mechanisms
- security management
- data encryption
- cryptographic protocols
- security level
- key management
- security protocols
- heterogeneous platforms
- security systems
- authentication scheme
- electronic voting
- security analysis
- security model
- access control mechanism
- security properties
- public key encryption
- user authentication
- security policies
- authentication mechanism
- information security
- stream cipher
- diffie hellman
- security architecture
- security services
- access control
- identity management
- data security
- authentication protocol
- mobile agent system
- design process
- rfid systems
- countermeasures
- key exchange
- key agreement protocol
- embedded systems
- key exchange protocol
- software architecture
- electronic transactions
- secure routing
- wireless sensor networks
- key agreement
- payment systems
- secure communication
- encryption scheme
- key distribution
- engineering students