Login / Signup
Toward Systemically Secure IT Architectures.
Glenn M. Brunette
Christoph L. Schuba
Published in:
WETICE (2005)
Keyphrases
</>
covert channel
key management
multi agent
intrusion detection
database
neural network
information systems
electronic commerce
security requirements
security protocols
security level
security services
authentication mechanism
heterogeneous platforms