Security through legality.
Stephen BonoAviel D. RubinAdam StubblefieldMatthew GreenPublished in: Commun. ACM (2006)
Keyphrases
- information security
- security issues
- access control
- intrusion detection
- security requirements
- security problems
- security threats
- security policies
- security level
- information assurance
- security mechanisms
- functional requirements
- network security
- statistical databases
- risk analysis
- key management
- computer security
- power system
- case study
- social networks
- trusted computing
- security measures
- data mining