Provable Security: How Feasible Is It?
Gerwin KleinToby C. MurrayPeter GammieThomas SewellSimon WinwoodPublished in: HotOS (2011)
Keyphrases
- information security
- security problems
- access control
- statistical databases
- security requirements
- security management
- intrusion detection
- network security
- security issues
- security systems
- authentication protocol
- user authentication
- computer security
- security mechanisms
- databases
- security policies
- security threats
- information assurance
- security measures
- sensitive data
- cyber security
- security analysis
- feasible solution
- web services
- data mining
- neural network