Intentionality and Agency in Security (Transcript of Discussion).
Kat KrolPublished in: Security Protocols Workshop (2018)
Keyphrases
- network security
- computer security
- information security
- security threats
- security level
- security requirements
- access control
- intrusion detection
- statistical databases
- security issues
- information assurance
- counter terrorism
- security problems
- mental states
- case study
- human operators
- functional requirements
- literature review
- security protocols
- authentication protocol
- security properties
- security policies
- computer systems
- security management
- data sets