Handling Passwords with Security and Reliability in Background Processes.
Don LibesPublished in: LISA (1994)
Keyphrases
- information security
- user authentication
- intrusion detection
- network security
- authentication systems
- reliability analysis
- security issues
- security requirements
- security policies
- computer security
- sensitive data
- functional requirements
- access control
- security management
- biometric systems
- network management
- statistical databases
- security analysis
- cyber security
- critical infrastructure
- security systems
- process model
- low cost
- information assurance