Keyphrases
- quantitative evaluation
- injection attacks
- security protocols
- sql injection
- security properties
- ground truth
- key management
- encryption scheme
- security requirements
- cryptographic protocols
- qualitative evaluation
- smart card
- security issues
- web applications
- security policies
- intrusion detection
- access control
- recommender systems
- security vulnerabilities
- information security
- quality assessment
- security analysis
- countermeasures
- network security
- formal model
- lightweight
- user interface
- hash functions
- image data
- security mechanisms
- sensitive data
- data mining