A Formalization of Declassification with WHAT-and-WHERE-Security.
Sylvia GreweAlexander LuxHeiko MantelJens SauerPublished in: Arch. Formal Proofs (2014)
Keyphrases
- information security
- access control
- security issues
- high security
- intrusion detection
- network security
- security policies
- security problems
- security requirements
- data security
- security management
- key management
- network management
- cyber attacks
- security threats
- authentication protocol
- information assurance
- neural network
- cyber security
- security protocols
- security mechanisms
- sensitive data
- statistical databases
- risk assessment
- low cost
- knowledge representation
- control system