Login / Signup
A methodology to build run-time monitors for security-aware workflows.
Clara Bertolissi
Silvio Ranise
Published in:
ICITST (2013)
Keyphrases
</>
information security
security issues
computer security
taking care
security systems
intrusion detection
security problems
anomaly detection
security requirements
access control
data processing
electronic commerce
network security
statistical databases
security analysis
cyber security
security model
case study