Login / Signup
Reconstructing a formal security model.
Gail-Joon Ahn
Seng-Phil Hong
Michael E. Shin
Published in:
Inf. Softw. Technol. (2002)
Keyphrases
</>
security model
access control
security analysis
public key
security requirements
security architecture
provably secure
designated verifier
formal model
public key cryptography
databases
data mining
artificial intelligence
information systems
motion estimation