Login / Signup

Avoiding information leakage in security-policy-aware planning.

Keith IrwinTing YuWilliam H. Winsborough
Published in: WPES (2008)
Keyphrases
  • security policies
  • information leakage
  • access control
  • network security
  • security management
  • security requirements
  • personal information
  • distributed systems
  • secret information
  • data collection