Security and Protection in Timor Programs.
James Leslie KeedyKlaus EspenlaubChristian HeinleinGisela MengerPublished in: J. Object Technol. (2008)
Keyphrases
- information security
- security level
- security architecture
- data protection
- protection scheme
- intrusion detection
- security issues
- network security
- security policies
- access control
- protection mechanisms
- security requirements
- critical infrastructure
- information systems
- risk analysis
- biometric template
- answer sets
- computer security
- data confidentiality
- security mechanisms
- previously mentioned
- individual privacy
- data security
- privacy protection
- statistical databases
- distributed systems
- security problems
- data encryption
- logic programming