Login / Signup
Memory-Centric Security Architecture.
Weidong Shi
Chenghuai Lu
Hsien-Hsin S. Lee
Published in:
HiPEAC (2005)
Keyphrases
</>
peer to peer
security architecture
access control
security model
security policies
simulation platform
data integrity
databases
intrusion detection system
database
database systems
computer systems
intrusion detection
computer networks
security mechanisms