Tracing Attacks and Restoring Integrity with Lascar.
Alexandre AelligPhilippe OechslinPublished in: IICIS (2003)
Keyphrases
- countermeasures
- malicious attacks
- detect malicious
- security mechanisms
- traffic analysis
- integrity checking
- integrity constraints
- watermarking algorithm
- database integrity
- security threats
- security vulnerabilities
- trusted computing
- denial of service attacks
- security risks
- cooperative
- cyber attacks
- dos attacks
- computer security
- fine grained