作者: Michael C. Dapp
DOI:
关键词:
摘要: Security policy manager devices are leveraged by objects to use highly secure user transparent communications provide detection of questionable activities at every node, automatic collection information related any potential attack, isolation the offending object with arbitrary flexibility response (e.g. flexibly determining level certainty an attack for initiation a in accordance number nodes be partitioned that is determined collected data concerning attack), changing trust relationships between security domains, limiting and launching offensive warfare capabilities outbound from compromised node while or eliminating inbound communications) log time simultaneously and/or concurrently different but possibly overlapping sections segments digital network configuration.