A distributed system security architecture: applying the transport layer security protocol.
Mohammad MirhakkakPublished in: Comput. Commun. Rev. (1993)
Keyphrases
- distributed systems
- security architecture
- security protocols
- security policies
- security mechanisms
- security requirements
- operating system
- access control
- security model
- load balancing
- software architecture
- distributed computing
- distributed environment
- mobile agents
- security issues
- resource constrained
- security analysis
- data integrity
- end to end
- application layer
- smart card
- information systems
- network layer
- data warehouse