Security oriented program transformations (or how to add security on demand).
Munawar HafizPublished in: OOPSLA Companion (2008)
Keyphrases
- intrusion detection
- security policies
- information security
- security systems
- statistical databases
- security issues
- access control
- network security
- security problems
- security properties
- security level
- encryption scheme
- information assurance
- security measures
- security threats
- cyber attacks
- security analysis
- key management
- security mechanisms
- database
- security requirements
- cloud computing
- wireless sensor networks