A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security].
Frank L. MayerPublished in: ACSAC (1990)
Keyphrases
- computer security
- trusted computing
- computer systems
- anomaly detection
- information security
- intrusion detection
- network security
- intrusion detection system
- trust model
- network intrusion detection
- trust evaluation
- smart card
- computer networks
- classification accuracy
- association rules
- object recognition
- face recognition
- case study
- learning algorithm