Title :
A Comprehensive Security Model for Networking Applications
Author :
Chan-Tin, Eric ; Chen, Tingting ; Kak, Subhash
Author_Institution :
Comput. Sci. Dept., Oklahoma State Univ., Stillwater, OK, USA
fDate :
July 30 2012-Aug. 2 2012
Abstract :
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributed systems, and cellphone networks. The architecture for these applications is not secure as shown by all the recent widely-publicized attacks. We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model.
Keywords :
Internet telephony; cloud computing; computer network security; cryptography; electronic commerce; mobile computing; software architecture; Internet; VOIP; Web browsing; cellphone networks; cloud computing; comprehensive security model; data storage; distributed systems; e-commerce; key distribution techniques; key management techniques; networking applications; realistic trust model; social networks; widely-publicized attacks; wireless networks; Cloud computing; Computational modeling; Cryptography; Reliability; Servers;
Conference_Titel :
Computer Communications and Networks (ICCCN), 2012 21st International Conference on
Conference_Location :
Munich
Print_ISBN :
978-1-4673-1543-2
DOI :
10.1109/ICCCN.2012.6289238