The management of computer security profiles using a role-oriented approach.
Sebastiaan H. von SolmsIsak van der MerwePublished in: Comput. Secur. (1994)
Keyphrases
- computer security
- information security
- computer systems
- intrusion detection
- anomaly detection
- information management
- information systems
- network security
- management system
- data processing
- network intrusion detection
- computer forensics
- database systems
- data management
- knowledge management
- user profiles
- intrusion detection system
- smart card
- supervised learning
- multi class
- decision making
- data mining
- data sets