Login / Signup
The Security Twin Peaks.
Thomas Heyman
Koen Yskout
Riccardo Scandariato
Holger Schmidt
Yijun Yu
Published in:
ESSoS (2011)
Keyphrases
</>
information security
access control
security requirements
security issues
security policies
intrusion detection
security threats
security problems
computer security
security level
information assurance
security measures
key management
data security
rfid tags
security management
network security
decision making