Enabling trustworthy spaces via orchestrated analytical security.
Joshua HowesJames SolderitschIgnatius ChenJonté CraigheadPublished in: CSIIRW (2013)
Keyphrases
- information security
- security issues
- security requirements
- intrusion detection
- security management
- computer security
- security properties
- access control
- security measures
- network security
- security threats
- security problems
- risk analysis
- security analysis
- security mechanisms
- information assurance
- cryptographic protocols
- database
- statistical databases
- security policies
- lightweight
- real time