A Comprehensive Security Model for Networking Applications
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributed systems, and cellphone networks. The architecture for these applicat...
Saved in:
Published in | 2012 21st International Conference on Computer Communications and Networks (ICCCN) pp. 1 - 5 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributed systems, and cellphone networks. The architecture for these applications is not secure as shown by all the recent widely-publicized attacks. We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model. |
---|---|
ISBN: | 9781467315432 1467315435 |
ISSN: | 1095-2055 2637-9430 |
DOI: | 10.1109/ICCCN.2012.6289238 |