Login / Signup
Towards Proving Security in the Presence of Large Untrusted Components.
June Andronick
David Greenaway
Kevin Elphinstone
Published in:
SSV (2010)
Keyphrases
</>
security policies
information security
access control
sensitive data
third party
network security
security level
distributed systems
security management
hash functions
information assurance
security systems
data security
security issues
data mining
building blocks
case study