FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput.
Muhammad Adil InamAkul GoyalJason LiuJaron MinkNoor MichaelSneha GaurAdam BatesWajih Ul HassanPublished in: ACSAC (2022)
Keyphrases
- statistical databases
- access control
- malicious code detection
- forensic analysis
- inference control
- security requirements
- response time
- information security
- security issues
- security policies
- network security
- security mechanisms
- data security
- intrusion detection
- computer security
- information systems
- medium access control
- radio frequency identification rfid
- security level
- encryption scheme
- security threats
- end to end
- confidential information
- law enforcement agencies
- security systems
- rfid tags