Proactive Provenance Policies for Automatic Cryptographic Data Centric Security.
Shamaria EngramTyler KaczmarekAlice LeeDavid BigelowPublished in: IPAW (2021)
Keyphrases
- data centric
- data security
- data driven
- security protocols
- security properties
- key management
- data management
- business processes
- information management
- encryption scheme
- wireless sensor networks
- security policies
- information security
- xml schema
- security requirements
- application development
- data storage
- smart card
- distributed systems
- information integration
- data sets
- routing protocol
- security mechanisms
- semi automatic
- information extraction
- domain knowledge