Micro-Policies: Formally Verified, Tag-Based Security Monitors.
Catalin HritcuPublished in: PLAS@ECOOP (2015)
Keyphrases
- information security
- security requirements
- security policies
- statistical databases
- security systems
- information assurance
- intrusion detection
- role based access control
- computer security
- security threats
- network security
- security mechanisms
- management policies
- security management
- security problems
- neural network
- security issues
- access control
- security analysis
- data security
- security properties
- biometric systems
- optimal policy
- anomaly detection
- security vulnerabilities
- recommender systems