Compositional Security for Reentrant Applications.
Ethan CecchettiSiqiu YaoHaobin NiAndrew C. MyersPublished in: CoRR (2021)
Keyphrases
- information security
- security policies
- intrusion detection
- security issues
- security management
- network security
- access control
- computer security
- statistical databases
- security measures
- security systems
- network management
- security mechanisms
- data security
- cyber attacks
- user authentication
- security level
- security threats
- anomaly detection
- neural network