Threat-Based Configuration Architecture for Security Gateways.
Chin-Fu KuoChi-Ying ChenChi-Sheng ShihTei-Wei KuoPublished in: ICON (2006)
Keyphrases
- security issues
- security architecture
- information security
- intrusion detection
- service management
- software architecture
- security systems
- security requirements
- distributed multimedia
- real time
- network security
- access control
- statistical databases
- security model
- privacy issues
- highly distributed
- enterprise systems
- cyber crime
- application level
- security policies
- hardware implementation
- peer to peer
- management system
- database systems