Security from Disjoint Paths: Is It Possible?
Sergiu CosteaMarios O. ChoudaryCostin RaiciuPublished in: Security Protocols Workshop (2017)
Keyphrases
- disjoint paths
- intrusion detection
- directed graph
- security systems
- network security
- access control
- information assurance
- security policies
- approximation algorithms
- information security
- security requirements
- computer security
- cyber security
- undirected graph
- security issues
- functional requirements
- security management
- information systems
- security level
- privacy preserving