Flexible security and its technology limits.
Viktor FischerLionel TorresDaniel MesquitaPublished in: ReCoSoC (2006)
Keyphrases
- cost effective
- rapid development
- data encryption
- case study
- data processing
- access control
- intrusion detection
- network security
- information processing systems
- intrusion detection and prevention
- information assurance
- statistical databases
- key technologies
- radio frequency identification rfid
- cyber security
- security issues
- security policies
- data mining
- computer systems
- information systems