IMS security.
Erik E. AnderlindDavid W. FaucherEric H. GrosseDaniel N. HeerAndrew R. McGeeDavid P. StrandRobert J. Thornberry Jr.Published in: Bell Labs Tech. J. (2006)
Keyphrases
- information security
- security requirements
- access control
- security issues
- security policies
- information assurance
- security threats
- security problems
- security analysis
- statistical databases
- human operators
- e learning
- security measures
- network security
- computer networks
- functional requirements
- key management
- computer systems
- security properties
- information systems
- security vulnerabilities
- neural network