Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract)
Richard ClevePublished in: STOC (1986)
Keyphrases
- extended abstract
- parallel algorithm
- security requirements
- access control
- intrusion detection
- information security
- information assurance
- security issues
- security policies
- security threats
- database
- computer security
- data security
- security vulnerabilities
- multiple faults
- security management
- sensitive data
- security model
- security problems
- security systems
- security level
- embedded processors
- security mechanisms
- single processor
- parallel architecture
- high end
- encryption scheme
- shared memory
- network security
- parallel processing
- fault diagnosis
- expert systems