An approach to correctness of security and operational business policies.
Vahid R. KarimiDonald D. CowanPaulo S. C. AlencarPublished in: Int. J. Account. Inf. Syst. (2014)
Keyphrases
- decision making
- service management
- information security
- electronic commerce
- access control
- data mining
- network security
- business processes
- security requirements
- security issues
- information systems
- intrusion detection
- enterprise systems
- business models
- business intelligence
- role based access control
- security policies
- real world
- data security
- business process
- business applications
- key management
- optimal policy
- knowledge management
- trust relationships
- management policies
- supply chain management
- data quality
- privacy concerns
- case study
- encryption scheme
- cyber security
- rfid technology
- privacy preserving