Login / Signup
Security Level Evaluation: Policy and Fuzzy Techniques.
Valentina Casola
Massimiliano Rak
Rosa Preziosi
Luigi Troiano
Published in:
ITCC (2) (2004)
Keyphrases
</>
security level
ahp method
fuzzy sets
information security
evaluation model
membership functions
data sets
fuzzy logic
optimal policy
fuzzy clustering
evaluation method
databases
group decision making
fuzzy comprehensive evaluation
real time
lightweight
fuzzy rules
database
information systems
secret key
biometric data