Keyphrases
- computer networks
- network security
- computer security
- scheduling problem
- access control
- security threats
- role based access control
- security policies
- role assignment
- information assurance
- round robin
- security issues
- information security
- security requirements
- dynamic scheduling
- intrusion detection
- neural network
- parallel machines
- resource constraints
- security systems
- scheduling algorithm
- flexible manufacturing systems