Forward-Security Under Continual Leakage.
Mihir BellareAdam O'NeillIgors StepanovsPublished in: CANS (2017)
Keyphrases
- information security
- security systems
- information leakage
- security issues
- data sets
- access control
- forward and backward
- security mechanisms
- information assurance
- security management
- functional requirements
- case study
- database
- security policies
- bi directional
- computer security
- security analysis
- security measures
- intrusion detection
- security problems
- control system
- databases
- key agreement protocol
- security threats
- security properties
- security level
- cyber attacks
- network management
- data security
- cyber security
- data integrity
- network security
- statistical databases