Is Managing IT Security a Mirage?
Conrad ShayoJavier TornerFrank LinJake ZhuJoon SonPublished in: CPR (2015)
Keyphrases
- access control
- information security
- security requirements
- information assurance
- security policies
- intrusion detection
- security mechanisms
- network security
- statistical databases
- high security
- security problems
- security analysis
- database
- computer security
- security systems
- neural network
- information systems
- security level
- database security
- key management
- rfid tags
- data mining