Minimizing Organizational User Requirement while Meeting Security Constraints.
Arindam RoyShamik SuralArun Kumar MajumdarJaideep VaidyaVijayalakshmi AtluriPublished in: ACM Trans. Manag. Inf. Syst. (2015)
Keyphrases
- information technology
- information systems
- information security management
- user authentication
- user defined constraints
- end users
- user interaction
- constrained optimization
- security requirements
- user friendliness
- malicious users
- resource constraints
- user preferences
- user defined
- information security
- user model
- security policies
- security mechanisms
- access control
- optimization criteria
- web search