Protection security assessment - System evaluation based on fuzzification of protection settings.
Maximilian DauerJohann JaegerThomas BoppRainer KrebsPublished in: ISGT Europe (2013)
Keyphrases
- information security
- security level
- protection scheme
- security architecture
- data protection
- critical infrastructure
- biometric template
- access control
- network security
- data confidentiality
- assessment process
- computer security
- protection schemes
- security requirements
- privacy protection
- security issues
- key management
- security systems
- risk assessment
- individual privacy
- security policies
- quality assessment
- information systems
- protection mechanisms
- neural network