Handling inheritance violation for secure interoperation of heterogeneous systems.
Hejiao HuangHélène KirchnerSongyun LiuWeili WuPublished in: Int. J. Secur. Networks (2009)
Keyphrases
- heterogeneous systems
- distributed architecture
- application developers
- computing systems
- web services
- parallel architectures
- grid environment
- parallel computing
- data sources
- cyber attacks
- legacy systems
- privacy preserving
- security issues
- security requirements
- multiple types
- object oriented
- parallel execution
- databases