Short Paper: Weak Runtime-Irrelevant Typing for Security.
Matthías Páll GissurarsonAgustín MistaPublished in: PLAS@CCS (2020)
Keyphrases
- computer security
- security issues
- access control
- intrusion detection
- security mechanisms
- security requirements
- information assurance
- security systems
- information security
- security policies
- security analysis
- statistical databases
- security threats
- key management
- case study
- feature selection
- information systems
- data mining
- network security
- information sharing
- operating system
- cyber security
- security management