Abstrait

Study of system security architecture

Jiang He


This paper describes the hybrid nature of a DCEÂ’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE memberÂ’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.


Indexé dans

  • CASS
  • Google Scholar
  • Ouvrir la porte J
  • Infrastructure nationale du savoir de Chine (CNKI)
  • CiterFactor
  • Cosmos SI
  • Bibliothèque de revues électroniques
  • Répertoire d’indexation des revues de recherche (DRJI)
  • Laboratoires secrets des moteurs de recherche
  • ICMJE

Voir plus

Flyer