Comparing reliability and security: Concepts, requirements, and techniques.
Robert S. HanmerDonald T. McBrideVeena B. MendirattaPublished in: Bell Labs Tech. J. (2007)
Keyphrases
- functional requirements
- information security
- intrusion detection
- security issues
- access control
- key management
- security requirements
- background knowledge
- data sets
- security properties
- statistical databases
- application specific
- network security
- security mechanisms
- computer security
- cyber security
- security systems
- security measures
- user friendliness
- information assurance