Keyphrases
- information security
- distributed data mining
- mobile agents
- security issues
- security requirements
- security services
- access control
- intrusion detection
- public key infrastructure
- security policies
- security architecture
- computing infrastructure
- identity management
- security mechanisms
- security model
- enterprise wide
- service management
- functional requirements
- critical infrastructure
- security protocols
- security analysis
- data mining
- biometric systems
- information exchange
- personal information
- computing environments
- data collection