Next generation computing: the rise of the utility in a future that is cloudy with scattered security.
Jim StikeleatherPublished in: CSIIRW (2010)
Keyphrases
- long term
- information security
- network management
- information assurance
- security requirements
- web intelligence
- network security
- utility function
- intrusion detection
- access control
- real world
- security mechanisms
- data security
- security policies
- decision making
- key management
- paradigm shift
- security model
- security properties
- privacy requirements
- security vulnerabilities
- neural network