Frontiers in Security and Dependability.
Edgar R. WeipplA Min TjoaSimon TjoaPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2013)
Keyphrases
- security issues
- information security
- security requirements
- computer security
- intrusion detection
- security management
- network security
- security model
- security systems
- key management
- statistical databases
- ambient intelligence
- access control
- complex systems
- software systems
- security properties
- artificial intelligence
- information assurance
- security measures
- database
- data security
- security mechanisms
- functional requirements
- case study
- databases