Login / Signup
Verifying System Integrity by Proxy.
Joshua Schiffman
Hayawardh Vijayakumar
Trent Jaeger
Published in:
TRUST (2012)
Keyphrases
</>
database integrity
data integrity
integrity constraints
integrity checking
model checking
integrity verification
real time
data sets
information systems
clustering algorithm
expert systems
data confidentiality