It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
Rock StevensJosiah DykstraWendy Knox EveretteMichelle L. MazurekPublished in: IEEE Secur. Priv. (2020)
Keyphrases
- information security
- access control
- security requirements
- network security
- intrusion detection
- information assurance
- security mechanisms
- statistical databases
- security policies
- security issues
- computer security
- automatic programming
- security model
- sensitive data
- functional requirements
- events occur
- security level
- answer sets
- security measures
- security systems
- data security
- security protocols
- data integrity
- data privacy