Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem.
Bruno d'AusbourgChristel CalasPublished in: J. Comput. Secur. (1996)
Keyphrases
- security measures
- single point of failure
- security issues
- computer networks
- security threats
- distributed network
- peer to peer
- security requirements
- security mechanisms
- mobile agent system
- key management
- security architecture
- information security
- security management
- network management
- application level
- security level
- remote server
- secure multiparty computation
- security services
- security protocols
- key distribution
- sensitive data
- access control
- distributed systems
- rights management
- group communication
- diffie hellman
- authentication mechanism
- wireless sensor networks
- user authentication
- security model
- data security
- computing platform
- communication cost
- lightweight
- advanced metering infrastructure
- privacy preserving
- mobile agents
- electronic voting
- data encryption
- network structure
- key agreement protocol
- network traffic
- distributed environment
- trusted computing
- security policies
- multi party
- security analysis
- network nodes
- trust relationships
- computing environments
- key exchange protocol
- integrity verification
- intrusion detection
- virtual private network
- cyber attacks