The Chief Security Officer Problem
Kamesh NamuduriLi LiMahadevan GomathisankaranMurali R. VaranasiPublished in: CoRR (2012)
Keyphrases
- information security
- access control
- intrusion detection
- security issues
- security policies
- statistical databases
- neural network
- security requirements
- risk assessment
- network security
- key agreement protocol
- security mechanisms
- computer security
- security systems
- security properties
- cryptographic protocols
- security vulnerabilities
- security management
- security threats
- security level
- cyber attacks
- data security
- sensitive data
- database systems