A Flexible Approach Towards Security Validation.
Michael AtighetchiFusun YamanDavid LastNicholas PaltzerMeghan CaiazzoStephen RaioPublished in: SafeConfig@CCS (2017)
Keyphrases
- information security
- security requirements
- intrusion detection
- security issues
- information assurance
- security threats
- security level
- security policies
- network security
- lightweight
- statistical databases
- key management
- data security
- security systems
- case study
- high security
- access control
- security mechanisms
- database systems
- security properties
- security problems
- security vulnerabilities
- databases