Verifying Security.
Maureen Harris CheheylMorrie GasserGeorge A. HuffJonathan K. MillenPublished in: ACM Comput. Surv. (1981)
Keyphrases
- security requirements
- access control
- intrusion detection
- security issues
- information assurance
- information security
- network security
- security policies
- security threats
- security mechanisms
- security level
- security measures
- low cost
- decision making
- security analysis
- cyber security
- cyber attacks
- security management
- learning algorithm