Indifferentiable Security Reconsidered: Role of Scheduling.
Kazuki YoneyamaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2012)
Keyphrases
- information security
- scheduling problem
- intrusion detection
- scheduling algorithm
- flexible manufacturing systems
- role based access control
- neural network
- dynamic scheduling
- role assignment
- data sets
- security threats
- user authentication
- data security
- security issues
- parallel machines
- statistical databases
- security systems
- security problems
- security policies
- network security
- response time