Evaluating information security tradeoffs: Restricting access can interfere with user tasks.
Gerald V. PostAlbert KaganPublished in: Comput. Secur. (2007)
Keyphrases
- information security
- user authentication
- countermeasures
- information systems
- information security management
- network security
- security issues
- intrusion detection
- smart card
- smart grid
- information assurance
- computer security
- security requirements
- security level
- technical issues
- risk analysis
- e government
- data protection
- data mining
- privacy concerns
- risk assessment
- access control
- distributed systems
- user interface
- data security
- iso iec
- user requests
- cyber defense