A security retrofit of VM/370.
Barry D. GoldRichard R. LindeR. J. PeelerMarvin SchaeferJohn F. ScheidP. D. WardPublished in: MARK (1979)
Keyphrases
- security issues
- access control
- information security
- network security
- security policies
- security requirements
- intrusion detection
- virtual machine
- security problems
- security mechanisms
- genetic algorithm
- data encryption
- security management
- security threats
- security systems
- data security
- databases
- computer security
- key management
- statistical databases
- information assurance