Login / Signup

Open vs. closed: which source is more secure?

Richard Ford
Published in: ACM Queue (2007)
Keyphrases
  • closed world
  • databases
  • information systems
  • intrusion detection
  • case study
  • data streams
  • multiple sources
  • security requirements
  • scalar product