Login / Signup
A Correctness Proof of a Mesh Security Architecture.
Doug Kuhlman
Ryan Moriarty
Tony Braskich
Steve Emeott
Mahesh V. Tripunitara
Published in:
CSF (2008)
Keyphrases
</>
security architecture
access control
security policies
security model
intrusion detection system
security mechanisms
insider threat
data integrity
simulation platform
information systems
low cost
intelligent agents
data protection