Verification of Stored Security Data in Computer System.
Heng-Sheng ChenTsang-Yean LeeHuey-Ming LeePublished in: ACIIDS (1) (2010)
Keyphrases
- computer systems
- data processing
- data sets
- database
- data collection
- operating system
- original data
- data analysis
- raw data
- image data
- training data
- data management
- high quality
- high dimensional data
- databases
- computer security
- sensitive data
- hardware and software
- high end
- model checking
- missing data
- access control
- data points
- information systems