The ACM Computing Classification System (1998) D.4.6 Security and Protection Access controls Authentication Cryptographic controls Information flow controls Invasive software (e.g., viruses, worms, Trojan horses) Security kernels [**] Verification [**]