Averting Security Missteps in Outsourcing.
E. Michael PowerRoland L. TropePublished in: IEEE Secur. Priv. (2005)
Keyphrases
- information security
- information technology
- security threats
- security issues
- information systems
- intrusion detection
- computer security
- sensitive data
- information assurance
- security management
- security level
- decision making
- security systems
- security model
- data security
- outsourced databases
- neural network
- security requirements
- access control
- key management
- security mechanisms
- security analysis
- authentication protocol
- risk assessment
- information flow
- transaction costs
- service providers
- security properties
- security problems
- case study
- security vulnerabilities
- social networks
- database