Improving the information security audit of enterprise using XML technologies.
Iryna GolyashSvitlana SachenkoSergey RippaPublished in: IDAACS (2) (2011)
Keyphrases
- information security
- intrusion detection
- information security management
- information systems
- security issues
- countermeasures
- technical issues
- extensible markup language
- content management
- network security
- security requirements
- xml documents
- iso iec
- smart card
- data mining
- information management
- information assurance
- xml data
- anomaly detection
- e government
- security level
- object oriented
- risk analysis
- risk assessment
- databases
- knowledge management
- smart grid
- open standards
- cyber defense
- data centric
- critical infrastructure
- privacy concerns
- metadata
- e learning
- machine learning