Demonstrating Security for Trusted Applications on a Security Kernel Base.
Stanley R. Ames Jr.James G. Keeton-WilliamsPublished in: IEEE Symposium on Security and Privacy (1980)
Keyphrases
- intrusion detection
- network connection
- access control
- information security
- security issues
- statistical databases
- security requirements
- network security
- information assurance
- security management
- security problems
- computer security
- data security
- trusted computing
- data sets
- network management
- security policies
- electronic commerce
- functional requirements
- security protocols
- feature space
- database systems
- security measures
- neural network