Possession as an Element of Information Security.
Donn B. ParkerPublished in: Inf. Secur. J. A Glob. Perspect. (1995)
Keyphrases
- information security
- countermeasures
- information systems
- security issues
- network security
- intrusion detection
- smart card
- security requirements
- computer security
- information security management
- smart grid
- technical issues
- e government
- security level
- design theory
- user authentication
- risk analysis
- sensitive data
- risk assessment
- information assurance
- cyber defense
- data security
- iso iec
- security risks
- association rules
- machine learning
- databases