Login / Signup
Checking and Enforcing Security through Opacity in Healthcare Applications.
Rym Zrelli
Moez Yeddes
Nejib Ben Hadj-Alouane
Published in:
CoRR (2017)
Keyphrases
</>
information security
access control
information systems
computer security
security issues
security requirements
network security
security systems
security problems
intrusion detection
statistical databases
security mechanisms
security management
security threats
security level
security model
information assurance