Security auditing in the fog.
Simon ParkinsonYongrui QinSaad KhanMauro VallatiPublished in: ICC (2017)
Keyphrases
- access control
- statistical databases
- malicious code detection
- inference control
- intrusion detection
- information security
- information assurance
- data security
- security issues
- security policies
- network security
- single image
- network management
- security management
- security analysis
- confidential information
- security problems
- security model
- data mining
- security protocols
- security mechanisms
- security requirements
- role based access control
- security level
- security properties
- computer security
- security threats
- security measures
- encryption scheme
- functional requirements
- neural network