The ACM Computing Classification System (1991)

D.4.6 Security and Protection

  • Access controls
  • Authentication
  • Cryptographic controls
  • Information flow controls
  • Invasive software (e.g., viruses, worms, Trojan horses)
  • Security kernels
  • Verification