Orchestration under Security Constraints.
Yannick ChevalierMohammed Anis MekkiMichaël RusinowitchPublished in: FMCO (2010)
Keyphrases
- information security
- access control
- security mechanisms
- security problems
- constraint satisfaction
- security policies
- resource constraints
- security requirements
- linear constraints
- computer security
- security threats
- data sets
- security level
- security model
- security protocols
- security analysis
- encryption scheme
- global constraints
- network security
- business processes
- database systems
- web services
- neural network