Computational Bounds on Hierarchical Data Processing with Applications to Information Security.
Roberto TamassiaNikos TriandopoulosPublished in: ICALP (2005)
Keyphrases
- information security
- data processing
- countermeasures
- security issues
- smart card
- intrusion detection
- security requirements
- network security
- computer security
- information security management
- computer systems
- security level
- information systems
- smart grid
- upper bound
- e government
- information assurance
- data analysis
- risk assessment
- cyber defense
- lower bound
- sensitive data
- data acquisition
- data management
- technical issues
- design theory
- privacy concerns
- data security
- low cost
- security risks
- active learning
- e learning