PIM Security (Transcript of Discussion).
Dieter GollmannPublished in: Security Protocols Workshop (2001)
Keyphrases
- security issues
- information security
- access control
- intrusion detection
- information assurance
- statistical databases
- security requirements
- network security
- functional requirements
- security mechanisms
- key management
- computer security
- security protocols
- security policies
- literature review
- cyber security
- security threats
- database