Chinese wall security policies information flows in business cloud.
Tsau-Young LinPublished in: IEEE BigData (2015)
Keyphrases
- security policies
- information flows
- access control
- information flow
- network security
- security management
- distributed systems
- cloud computing
- decision making
- organizational structure
- business processes
- security requirements
- emergency response
- business models
- information systems
- business process
- access control policies
- access control systems
- business intelligence
- business rules
- data mining
- operating system
- decision support
- business environment
- knowledge management
- data analysis
- real world