Keyphrases
- lower bound
- information security
- access control
- upper bound
- statistical databases
- security problems
- security issues
- information assurance
- security systems
- functional requirements
- security requirements
- intrusion detection
- network security
- high security
- computer vision
- security model
- computer security
- key management
- security mechanisms
- database systems
- face detection
- security policies
- np hard
- security protocols
- cyber security
- data security
- case study
- security management
- power system
- real time