Security policy specification templates for critical infrastructure services in the cloud.
Manuel RudolphReinhard SchwarzChristian JungPublished in: ICITST (2014)
Keyphrases
- security policies
- cyber attacks
- critical infrastructure
- access control
- business continuity
- network access
- ubiquitous computing environments
- data center
- network security
- cyber security
- access control mechanism
- security architecture
- cloud computing
- distributed systems
- information security
- network management
- smart grid
- security requirements
- ubiquitous computing
- web services
- data acquisition
- end users
- risk analysis
- information systems
- intrusion detection
- context aware
- homeland security
- computer networks
- data processing
- database systems