What do you assume? A Theory of Security-Related Assumptions.
Sophie CoralloThomas WeberLars KönigKathrin Leonie SchmidtFrederik ReicheAnne KoziolekPublished in: ICSE Companion (2024)
Keyphrases
- security issues
- statistical databases
- general theory
- security threats
- access control
- closely related
- security policies
- theoretical foundation
- security problems
- key management
- security requirements
- databases
- information security
- theoretical framework
- computational model
- intrusion detection
- social networks
- data mining