Login / Signup

Policy-based secure deletion.

Christian CachinKristiyan HaralambievHsu-Chun HsiaoAlessandro Sorniotti
Published in: CCS (2013)
Keyphrases
  • optimal policy
  • lightweight
  • security issues
  • multi party
  • security requirements
  • action selection
  • key management
  • policy making
  • covert channel
  • data sets
  • neural network
  • security management
  • data encryption