Secure Compilation to Protected Module Architectures.
Marco PatrignaniPieter AgtenRaoul StrackxBart JacobsDave ClarkeFrank PiessensPublished in: ACM Trans. Program. Lang. Syst. (2015)
Keyphrases
- sensitive data
- data protection
- security requirements
- unauthorized access
- covert channel
- security protocols
- key management
- security issues
- genetic algorithm
- security measures
- identity management
- lightweight
- access control
- data sharing
- key distribution
- data security
- neural network
- information retrieval
- authentication scheme
- user authentication
- security mechanisms
- privacy preserving
- smart card
- privacy protection
- data storage
- sensitive information