The Influence of Architectural Styles on Security, Using the Example of a Certification Authority.
Michael TänzerPublished in: CoRR (2014)
Keyphrases
- information security
- access control
- third party
- security requirements
- security issues
- intrusion detection
- security policies
- security systems
- database security
- network security
- functional requirements
- statistical databases
- information assurance
- security problems
- link analysis
- software architecture
- cd rom
- key management
- wireless sensor networks
- security level
- information systems
- security threats
- security management
- database