Concluding Discussion: When Does Confidentiality Harm Security?
Bruce ChristiansonPublished in: Security Protocols Workshop (2001)
Keyphrases
- information security
- access control
- security properties
- data confidentiality
- network security
- information leakage
- security issues
- security requirements
- intrusion detection
- data security
- security problems
- security management
- key management
- security policies
- information assurance
- statistical databases
- information systems
- security level
- security vulnerabilities
- security analysis
- functional requirements
- security systems
- security protocols
- data integrity
- security mechanisms
- sensitive data
- literature review
- countermeasures
- third party
- anomaly detection
- database systems
- case study