Managing Security: The Security Content Automation Protocol.
Shirley RadackRick KuhnPublished in: IT Prof. (2011)
Keyphrases
- security requirements
- security protocols
- ban logic
- cryptographic protocols
- formal analysis
- network security
- security issues
- security analysis
- key agreement protocol
- information security
- security properties
- security model
- access control
- key exchange protocol
- rfid systems
- security policies
- security threats
- statistical databases
- communication protocols
- security problems
- authentication protocol
- industrial automation
- key exchange
- multimedia
- secure routing
- secure multiparty computation
- electronic voting
- intrusion detection
- privacy preserving
- digital rights management
- physical layer
- rfid tags
- key distribution