Computer/telecommunications security - A role for management.
August BequaiPublished in: Comput. Law Secur. Rev. (1988)
Keyphrases
- role based access control
- security management
- network management
- management system
- access control
- information security management
- network security
- network monitoring
- data management
- risk analysis
- security policies
- computer systems
- intrusion detection
- information security
- rfid technology
- security issues
- decision making
- information management
- computer networks
- telecommunications networks
- project management
- computer security
- data security
- security systems
- computer technology
- enterprise systems
- security problems
- radio frequency identification rfid
- security mechanisms
- decision support
- data processing
- information systems
- role assignment
- security requirements