The use of mTags for mandatory security: a case study.
Ahmad Saif Ur RehmanAugusto Born de OliveiraMahesh V. TripunitaraSebastian FischmeisterPublished in: Softw. Pract. Exp. (2014)
Keyphrases
- case study
- access control
- information security
- network security
- statistical databases
- security issues
- intrusion detection
- test bed
- security vulnerabilities
- database
- security management
- security problems
- data security
- security requirements
- security policies
- computer security
- security threats
- data sets
- functional requirements
- user authentication
- social networks