Security and Rewriting (Dagstuhl Seminar 11332).
Hubert Comon-LundhRalf KüstersCatherine A. MeadowsPublished in: Dagstuhl Reports (2011)
Keyphrases
- intrusion detection
- information security
- security policies
- security issues
- computer security
- security problems
- access control
- network security
- rewrite rules
- security requirements
- network management
- security threats
- security level
- security systems
- data security
- special case
- security protocols
- key management
- encryption scheme
- data integrity
- security mechanisms
- security properties
- functional requirements
- logic programs
- databases
- security management
- rewriting rules
- information assurance
- rewriting systems