Keyphrases
- implementation issues
- security issues
- information assurance
- intrusion detection
- information security
- data security
- network security
- developing countries
- security requirements
- computer security
- security problems
- security level
- authentication protocol
- temporal evolution
- statistical databases
- access control
- low cost
- web services
- security analysis
- software evolution
- security protocols
- key management
- network management
- evolution process
- cyber attacks
- security properties
- security management
- database systems