Choosing a Security Option: The InfoSecure Methodology.
Shari Lawrence PfleegerThomas CiszekPublished in: IT Prof. (2008)
Keyphrases
- information security
- security requirements
- intrusion detection
- network security
- security level
- computer security
- databases
- security systems
- design methodology
- statistical databases
- access control
- functional requirements
- security mechanisms
- risk analysis
- key management
- security protocols
- decision making
- real time
- security properties