Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.
Basit ShafiqArjmand SamuelElisa BertinoArif GhafoorPublished in: ICDE (2006)
Keyphrases
- information security
- intrusion detection
- optimal solution
- information systems
- security management
- access control
- security issues
- constraint satisfaction
- security policies
- optimality criteria
- adaptation process
- security analysis
- key management
- security mechanisms
- linear constraints
- security requirements
- constrained optimization
- network security
- closed form
- business process
- data processing
- upper bound