Elements of a Security Architecture

N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, several lines of reasoning are brought together in order to outline and justify the elements of an exemplary security architecture that is based on the techniques of control and monitoring. In fact, this architecture also includes two other techniques sketched in Chapter 7, namely (the basic usage of) cryptography and the amalgam called certificates and credentials. The relevant reasonings consider mainly the abstract design of the three techniques; basic technical enforcement mechanisms for achieving isolation and, to a minor extent, redundancy and indistinguishability; the basic vulnerabilities of computing systems; and the need for establishing trust.

Cite

CITATION STYLE

APA

Elements of a Security Architecture. (2008). In Security in Computing Systems (pp. 303–354). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78442-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free