Login / Signup
A model-based repository of security and dependability patterns for trusted RCES.
Adel Ziani
Brahim Hamid
Jacob Geisel
Jean-Michel Bruel
Published in:
IRI (2013)
Keyphrases
</>
network connection
trusted computing
information security
security issues
access control
pattern mining
pattern discovery
digital libraries
information systems
security requirements
security problems
computer security
network security
outsourced databases
key management
design patterns
intrusion detection
metadata