Business-driven application security: From modeling to managing secure applications.
Nataraj NagaratnamAnthony J. NadalinMaryann HondoMichael McIntoshPaula AustelPublished in: IBM Syst. J. (2005)
Keyphrases
- security requirements
- security issues
- security mechanisms
- key management
- security analysis
- decision making
- sensitive data
- previously mentioned
- data mining
- security measures
- security level
- mission critical
- application level
- information security
- smart card
- business process
- key distribution
- business intelligence
- intrusion detection
- security management
- security services
- access control
- information systems