Location Security - Where to Enforce?
Saritha ArunkumarMudhakar SrivatsaMuttukrishnan RajarajanPublished in: MILCOM (2014)
Keyphrases
- access control
- security issues
- information security
- statistical databases
- information assurance
- security policies
- security level
- computer security
- network security
- intrusion detection
- security requirements
- data security
- security problems
- security management
- risk assessment
- malware detection
- security vulnerabilities
- database systems