Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.
Dinesha RanathungaMatthew RoughanPhil KernickNick FalknerHung X. NguyenPublished in: CPSS@ASIACSS (2015)
Keyphrases
- security policies
- access control
- network security
- security management
- network management
- security requirements
- access control systems
- access control policies
- distributed systems
- security concerns
- missing data
- database
- software engineering
- databases
- access control mechanism
- distributed environment
- ubiquitous computing environments
- event logs
- home network