Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
Wolfgang EßmayrEdgar R. WeipplPublished in: SEC (2000)
Keyphrases
- management policies
- management system
- security management
- information systems
- identity management
- security issues
- supply chain
- information security
- enterprise systems
- information security management
- enterprise network
- security requirements
- access control
- water resources
- security policies
- security level
- statistical databases
- security systems
- database
- security protocols
- intrusion detection
- knowledge management
- individual privacy