首页> 外文会议>International Workshop on Security Protocols >From Security Protocols to Systems Security
【24h】

From Security Protocols to Systems Security

机译:从安全协议到系统安全性

获取原文

摘要

When applying information security, we need to go beyond the analysis of individual security protocols and consider how they are used within distributed systems, software applications and services. Important as they are, security protocols only form a part of the overall security engineering design for a particular distributed system. The effective use of any security protocol will typically depend upon certain structural data such as key information being available for use by some - and at the same time made unavailable to others. Systems need to be designed with requirements like these in mind.
机译:应用信息安全时,我们需要超越对单个安全协议的分析,并考虑如何在分布式系统,软件应用程序和服务中使用它们。重要的是,安全协议仅为特定分布式系统构成整体安全工程设计的一部分。任何安全协议的有效使用通常取决于某些结构数据,例如可供某些的关键信息 - 并且同时为其他人提供不可用的时间。需要设计与这些要求的设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号