Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Zhengan HuangJunzuo LaiWenbin ChenTong LiYang XiangPublished in: Inf. Sci. (2019)
Keyphrases
- data security
- access control
- data integrity
- encryption decryption
- data management
- data confidentiality
- data centric
- data privacy
- information security
- web services
- business processes
- third party
- role based access control
- business process
- data protection
- data mining
- databases
- database
- wireless communication
- intrusion detection
- database systems
- information systems