Improving Messaging Security in Structured P2P Overlay Networks.
Heather YuJohn F. BufordMadjid MerabtiPublished in: ICME (2007)
Keyphrases
- security policies
- security requirements
- security issues
- network security
- real world
- intrusion detection
- information security
- information assurance
- computer security
- access control
- databases
- data sets
- high security
- security management
- cryptographic protocols
- security level
- security systems
- security model
- data integrity
- security mechanisms
- overlay network
- statistical databases
- fault tolerant
- smart card
- security analysis
- encryption scheme
- web services
- data sources
- sensor networks