Applying authentication and network security to in-cloud enterprise resource planning system.
Bao Rong ChangHsiu Fen TsaiYun-Che TsaiYi-Sheng ChangPublished in: Vietnam. J. Comput. Sci. (2014)
Keyphrases
- network security
- network access
- security management
- identity authentication
- intrusion detection
- computer networks
- security policies
- intrusion detection system
- traffic analysis
- network traffic
- dos attacks
- information security
- risk assessment
- computer security
- secure communication
- security protection
- anomaly detection
- cloud computing
- ip networks
- security breaches
- situation assessment
- knowledge management
- network administrators
- network management
- end hosts
- anti phishing
- data center