Protection Imperfect: The Security of Some Computing Environments.
Carole B. HoganPublished in: ACM SIGOPS Oper. Syst. Rev. (1988)
Keyphrases
- computing environments
- information security
- trusted computing
- security level
- security architecture
- critical infrastructure
- security issues
- security requirements
- data protection
- computer security
- protection scheme
- biometric template
- mobile environments
- grid computing
- mobile computing
- service discovery
- mobile agents
- intrusion detection
- low bandwidth
- access control
- security policies
- high performance computing
- individual privacy
- protection mechanisms
- previously mentioned
- data confidentiality
- pervasive computing environments
- computing platform
- data security
- reinforcement learning
- cooperative
- multi agent