Keyphrases
- security issues
- information security
- security policies
- intrusion detection
- security threats
- computer security
- network security
- security requirements
- access control
- distributed systems
- data sets
- information assurance
- functional requirements
- case study
- encryption scheme
- security level
- technology enhanced learning
- security mechanisms
- sensitive data
- databases