First step towards preserving the privacy of cloud-based IDS security policies.
Tytus KurekArtur LasonMarcin NiemiecPublished in: Secur. Commun. Networks (2015)
Keyphrases
- security policies
- security concerns
- access control
- network security
- intrusion detection system
- security requirements
- security management
- access control systems
- distributed systems
- intrusion detection
- security measures
- privacy preserving
- cyber attacks
- personal information
- access control policies
- data security
- cloud computing
- relational databases
- database systems
- home network
- dacs scheme
- database
- security mechanisms
- private information
- machine learning