A Linear Time Algorithm for Deciding Security
Anita K. JonesRichard J. LiptonLawrence SnyderPublished in: FOCS (1976)
Keyphrases
- intrusion detection
- information security
- access control
- network security
- security policies
- security requirements
- security systems
- data encryption
- security issues
- computer security
- information assurance
- security measures
- security properties
- security analysis
- data security
- key management
- security level
- human operators
- statistical databases
- steiner tree
- security vulnerabilities
- anomaly detection
- case study