Method for Information Security Events Detection in a Cloud Signature Systems
The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of...
Saved in:
Main Authors: | V. A. Gerasimov, O. V. Boyprav |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Ministry of Education of the Republic of Belarus, Establishment The Main Information and Analytical Center
2024-06-01
|
Series: | Цифровая трансформация |
Subjects: | |
Online Access: | https://dt.bsuir.by/jour/article/view/851 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
by: Li YAN, et al.
Published: (2015-10-01) -
Digital multi-signature scheme based on bilinear pairing
by: Cai-juan ZHANG, et al.
Published: (2016-06-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Study of BGP secure scheme based on divide and conquer strategy
by: Bin WANG, et al.
Published: (2012-05-01) -
Universal composable threshold signature
by: HONG Xuan1, et al.
Published: (2009-01-01)