Implementing Security Policy in a Large Defense Procurement.
M. NashR. J. KennettPublished in: ACSAC (1996)
Keyphrases
- security policies
- network security
- access control
- security management
- intrusion detection
- computer networks
- security concerns
- distributed systems
- security requirements
- intrusion detection system
- information security
- network management
- security architecture
- access control policies
- access control systems
- cyber attacks
- network traffic
- home network
- unauthorized access
- access control mechanism
- multi attribute
- database
- security measures
- advanced research projects agency