Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems.
Monowar HasanSibin MohanRakesh B. BobbaRodolfo PellizzoniPublished in: CoRR (2016)
Keyphrases
- information security
- security requirements
- security issues
- security problems
- information assurance
- computer security
- statistical databases
- access control
- security systems
- intrusion detection
- security policies
- sensitive data
- execution model
- security management
- database
- query processing
- spatio temporal
- database systems
- key management
- information systems
- control flow
- data mining
- security vulnerabilities