Login / Signup
Reducing TCB complexity for security-sensitive applications: three case studies.
Lenin Singaravelu
Calton Pu
Hermann Härtig
Christian Helmuth
Published in:
EuroSys (2006)
Keyphrases
</>
insider attacks
access control
information security
trusted computing
network security
security policies
computational complexity
computational cost
security problems
data sets
space complexity
statistical databases
security issues
security mechanisms
cryptographic protocols
security management