Login / Signup
Optimal Design of Information Technology Security Architecture.
Huseyin Cavusoglu
Srinivasan Raghunathan
Birendra K. Mishra
Published in:
ICIS (2002)
Keyphrases
</>
optimal design
security architecture
information technology
access control
security policies
security model
information systems
intrusion detection system
security mechanisms
data integrity
simulation platform
insider threat
database
resource constrained
security requirements
intrusion detection
data mining