Role-based information security: change management issues.
Pratap ChillakantiPublished in: ISICT (2004)
Keyphrases
- information security
- countermeasures
- information systems
- security issues
- information security management
- intrusion detection
- smart card
- network security
- sensitive data
- security requirements
- security level
- cyber defense
- risk assessment
- access control
- smart grid
- computer security
- iso iec
- database
- information assurance
- security threats
- design theory
- technical issues
- e government
- information retrieval
- learning algorithm
- privacy concerns
- user authentication
- data mining
- data protection
- data analysis
- real world
- information technology