-wise independence with applications to non-uniform security.
Nick GravinSiyao GuoTsz Chiu KwokPinyan LuPublished in: SODA (2021)
Keyphrases
- information security
- security systems
- security requirements
- security issues
- information assurance
- intrusion detection
- network security
- pairwise
- access control
- functional requirements
- independence assumption
- statistical databases
- risk assessment
- security policies
- anomaly detection
- sensitive data
- smart card
- security mechanisms
- smart grid
- key management
- computer security
- security problems
- security management
- database