Where to Integrate Security Practices on DevOps Platform.
Hasan YasarKiriakos KontostathisPublished in: Int. J. Secur. Softw. Eng. (2016)
Keyphrases
- information security
- intrusion detection
- security problems
- access control
- security threats
- network security
- security level
- security issues
- security mechanisms
- seamless integration
- security analysis
- computer security
- security requirements
- security policies
- data security
- wireless sensor
- service management
- security properties
- data mining
- key management
- human operators
- cyber security
- network management
- statistical databases
- database systems