Security enhancements to TLS for improved national control.
Lamya AlqaydiChan Yeob YeunErnesto DamianiPublished in: ICITST (2017)
Keyphrases
- information security
- control system
- intrusion detection
- network security
- security requirements
- access control
- united states
- control strategy
- security policies
- homeland security
- control method
- information assurance
- security level
- control theory
- cyber security
- risk analysis
- security mechanisms
- security issues
- data sets
- information technology
- metadata