The ACM Computing Classification System (1991)
D.4.6 Security and Protection
- Access controls
- Authentication
- Cryptographic controls
- Information flow controls
- Invasive software (e.g., viruses, worms, Trojan horses)
- Security kernels
- Verification
Return to: