Towards a security evaluation model based on security metrics.
Jakub BreierLadislav HudecPublished in: CompSysTech (2012)
Keyphrases
- security problems
- security issues
- intrusion detection
- security requirements
- access control
- information security
- statistical databases
- information assurance
- security management
- security systems
- computer security
- sensitive data
- evaluation methodology
- functional requirements
- key management
- data security
- security policies
- risk assessment
- cryptographic protocols
- evaluation criteria
- network security
- information retrieval