Login / Signup
Provenance as a Security Control.
Andrew P. Martin
John Lyle
Cornelius Namiluko
Published in:
TaPP (2012)
Keyphrases
</>
control system
security issues
intrusion detection
network security
real time
security systems
human operators
information security
metadata
neural network
data acquisition
functional requirements
computer security
security model
database
security level
security management