Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security.
Vincenzo DiLuoffoWilliam R. MichalsonBerk SunarPublished in: CoRR (2019)
Keyphrases
- access control
- trust negotiation
- security policies
- information security
- security issues
- information assurance
- security analysis
- security requirements
- network security
- security systems
- security mechanisms
- security protocols
- cyber security
- data security
- security level
- security problems
- security threats
- user authentication
- computer networks
- security measures
- diffie hellman
- security management
- security model
- computer security