Bounded KDM Security from iO and OWF.
Antonio MarcedoneRafael PassAbhi ShelatPublished in: SCN (2016)
Keyphrases
- security issues
- intrusion detection
- access control
- information security
- security policies
- security requirements
- data security
- security problems
- network security
- security systems
- security protocols
- security analysis
- security threats
- security level
- sensitive data
- functional requirements
- risk assessment
- decision making
- security properties
- databases
- database