Proactive Provenance Policies for Automatic Cryptographic Data Centric Security.
Shamaria EngramTyler KaczmarekAlice LeeDavid BigelowPublished in: CoRR (2021)
Keyphrases
- data centric
- data security
- data driven
- security protocols
- data management
- key management
- business processes
- security properties
- encryption scheme
- information management
- wireless sensor networks
- access control
- distributed systems
- metadata
- cryptographic protocols
- semi automatic
- application development
- smart card
- information security
- data storage
- security requirements
- routing protocol
- security policies
- information integration
- integrity constraints
- case study
- xml schema
- data sets
- data processing
- software engineering
- information extraction
- database systems
- website
- knowledge base
- databases