A Comprehensive Security Model for Networking Applications

The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributed systems, and cellphone networks. The architecture for these applicat...

Full description

Saved in:
Bibliographic Details
Published in2012 21st International Conference on Computer Communications and Networks (ICCCN) pp. 1 - 5
Main Authors Chan-Tin, E., Tingting Chen, Kak, S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributed systems, and cellphone networks. The architecture for these applications is not secure as shown by all the recent widely-publicized attacks. We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model.
ISBN:9781467315432
1467315435
ISSN:1095-2055
2637-9430
DOI:10.1109/ICCCN.2012.6289238