Home > Technical Reports > Proceedings of the Second EECE 512 Mini-Conference on Computer Security > Keywords |
<record>
<controlfield tag="001">135</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">ece512</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">ece 512</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">access control</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">python</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">capabilities</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">speculative</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">authorization</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">markov</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">human factors</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">design </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">social sofware</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">grounded theory</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">information sharing</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">information privacy </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">tagging</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">security incidents </subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">security Tasks</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">resources</subfield>
</datafield>
</record>