On the Role of Scheduling in Simulation-Based Security.
Ran CanettiLing CheungNancy A. LynchOlivier PereiraPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- scheduling problem
- scheduling algorithm
- role based access control
- access control
- information security
- information assurance
- security requirements
- network security
- statistical databases
- security issues
- dynamic scheduling
- security properties
- security problems
- data security
- key management
- security mechanisms
- security management
- role assignment
- data mining
- wafer fabrication
- security level
- real time database systems
- security protocols
- sensitive data
- resource constraints
- resource allocation
- database systems