Real-time scheduling with quality of security constraints.
Tao XieXiao QinAndrew H. SungMan LinLaurence Tianruo YangPublished in: Int. J. High Perform. Comput. Netw. (2006)
Keyphrases
- high quality
- security policies
- access control
- higher quality
- security requirements
- low quality
- constrained optimization
- information security
- quality measures
- linear constraints
- constraint programming
- security level
- user friendliness
- data security
- iso iec
- databases
- information assurance
- geometric constraints
- intrusion detection
- anomaly detection
- distributed systems
- genetic algorithm