On the Relationships between Notions of Simulation-Based Security.
Ralf KüstersAnupam DattaJohn C. MitchellAjith RamanathanPublished in: J. Cryptol. (2008)
Keyphrases
- information security
- intrusion detection
- access control
- security requirements
- information assurance
- security issues
- security problems
- security policies
- network security
- data mining
- causal relationships
- high security
- security management
- computer security
- security model
- security systems
- security level
- website
- mobile devices
- security vulnerabilities
- database
- security threats
- malware detection
- parent child
- data security
- key management
- databases
- statistical databases
- ad hoc networks