Study of system security architecture

Author(s): Jiang He

This paper describes the hybrid nature of a DCE’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE member’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.

Share this       

Share this Page.

Table of Contents

Scimago Journal Rank

SCImago Journal & Country Rank