Keyphrases
- access control
- information security
- computer security
- intrusion detection
- statistical databases
- security issues
- security requirements
- security policies
- real time
- functional requirements
- security vulnerabilities
- grid points
- security measures
- security management
- security threats
- security level
- role based access control
- authentication protocol
- key management
- risk analysis
- low cost
- neural network
- data sets