Keyphrases
- user authentication
- information security
- security requirements
- access control
- security policies
- security issues
- case study
- intrusion detection
- test bed
- computer security
- databases
- security threats
- security properties
- security systems
- security mechanisms
- statistical databases
- data security
- information assurance
- network security
- resource constrained
- decision making
- information systems
- data integrity
- security protocols
- authentication protocol
- security model
- social networks
- data mining
- neural network
- real time
- security management