Cyber Security in Parallel and Distributed Computing 2019
DOI: 10.1002/9781119488330.ch7
|View full text |Cite
|
Sign up to set email alerts
|

Cyber‐Security Techniques in Distributed Systems, SLAs and other Cyber Regulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Apart from the AIC triad, other factors have caught the attention recently, such as Possession or Control, Authenticity, Authorization, Audit (AAA), and Non-Repudiation [ 47 ].…”
Section: Smart City Layered Security Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from the AIC triad, other factors have caught the attention recently, such as Possession or Control, Authenticity, Authorization, Audit (AAA), and Non-Repudiation [ 47 ].…”
Section: Smart City Layered Security Servicesmentioning
confidence: 99%
“…Non-repudiation is the ability to demonstrate that a task or event has occurred by the object and cannot deny the authenticity of a specific data transferred [ 47 , 48 ].…”
Section: Smart City Layered Security Servicesmentioning
confidence: 99%