Login / Signup
Modeling and Checking the Security of DIFC System Configurations.
Mingyi Zhao
Peng Liu
Published in:
SafeConfig (2012)
Keyphrases
</>
information flow control
security policies
information security
security issues
key management
data security
social networks
database systems
cloud computing
statistical databases
security mechanisms
optimal configuration