Boosting efficiency and security in proof of ownership for deduplication.
Roberto Di PietroAlessandro SorniottiPublished in: AsiaCCS (2012)
Keyphrases
- intrusion detection
- computational complexity
- information security
- theorem prover
- user friendliness
- security problems
- security level
- security issues
- access control
- network security
- data sets
- theorem proving
- security policies
- anomaly detection
- security requirements
- functional requirements
- security systems
- linear combination
- machine learning