Composable Long-Term Security with Rewinding.
Robin BergerBrandon BroadnaxMichael KlooßJeremias MechlerJörn Müller-QuadeAstrid OttenhuesMarkus RaiberPublished in: TCC (4) (2023)
Keyphrases
- long term
- short term
- intrusion detection
- security issues
- information security
- computer security
- network security
- security policies
- security systems
- high security
- statistical databases
- security requirements
- security level
- data security
- security properties
- security problems
- functional requirements
- access control
- security threats
- genetic algorithm
- medium term
- key management
- security mechanisms
- computer networks
- anomaly detection
- control system