Comparative Analysis of ccTLD Security Policies.
Collins UmanaPavol ZavarskyRon RuhlDale LindskogOluwatoyin Gloria Ake-JohnsonPublished in: SocialCom/PASSAT (2010)
Keyphrases
- comparative analysis
- security policies
- access control
- distributed systems
- network security
- security management
- security concerns
- access control systems
- semi quantitative
- access control policies
- security requirements
- home network
- multilevel secure
- cyber attacks
- dacs scheme
- database
- access control mechanism
- fusion scheme
- fine grained
- intrusion detection
- data model