How good is a security policy against real breaches?: a HIPAA case study.
Özgür KafaliJasmine JonesMegan PetrusoLaurie A. WilliamsMunindar P. SinghPublished in: ICSE (2017)
Keyphrases
- security policies
- case study
- security concerns
- access control
- network security
- security management
- security requirements
- distributed systems
- network management
- real world
- security architecture
- access control policies
- home network
- information security
- data privacy
- ubiquitous computing environments
- software development
- access control systems