Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps.
Andreas SchreiberTim SonnekalbThomas S. HeinzeLynn von KurnatowskiJesús M. González-BarahonaHeather S. PackerPublished in: IPAW (2021)
Keyphrases
- access control
- information security
- security measures
- intrusion detection
- metadata
- network security
- security policies
- statistical databases
- security issues
- security requirements
- security threats
- security problems
- security level
- information assurance
- security management
- data security
- key management
- mobile applications
- scientific workflows
- security systems
- security analysis
- security properties
- functional requirements
- computer networks
- fine grained