by architecting and administering an IT security lab.
Brady R. StevensonGordon W. RomneyPublished in: SIGITE Conference (2004)
Keyphrases
- data integrity
- information assurance
- intrusion detection
- distributed databases
- information security
- statistical databases
- security vulnerabilities
- security properties
- access control
- security policies
- computer security
- security requirements
- data sets
- database
- security systems
- security problems
- databases
- security protocols
- authentication protocol
- database security
- security model
- database systems
- security threats