Keyphrases
- access control
- lower bound
- upper bound
- security issues
- information assurance
- security systems
- intrusion detection
- information security
- security mechanisms
- security requirements
- computer security
- worst case
- computer systems
- security policies
- security properties
- optimal solution
- case study
- information systems
- security problems
- security level
- network security
- malware detection
- security model
- security protocols
- security analysis
- key management
- databases
- face detection
- sensor networks
- data mining
- neural network