The Shadow Knows: Refinement and security in sequential programs.
Carroll MorganPublished in: Sci. Comput. Program. (2009)
Keyphrases
- information security
- security management
- access control
- security issues
- security measures
- intrusion detection
- security policies
- statistical databases
- security threats
- security problems
- computer security
- security requirements
- information assurance
- security systems
- key management
- computer programs
- network security
- light source
- human operators
- answer sets
- data security
- user authentication
- security properties
- single image
- distributed systems
- neural network
- step wise
- data sets