Information Security Modeling for the Operation of a Novel Highly Trusted Network in a Virtualization Environment.
Jung-Sook ChangYong-Hee JeonSohyun SimAn-Na KangPublished in: Int. J. Distributed Sens. Networks (2015)
Keyphrases
- information security
- network access
- network security
- critical infrastructure
- countermeasures
- information systems
- security issues
- intrusion detection
- computer security
- smart card
- information security management
- computer networks
- cloud computing
- smart grid
- information assurance
- e government
- wireless sensor networks
- network traffic
- network structure
- cloud computing environment
- security level
- security requirements
- sensitive data
- security risks
- cyber defense
- risk analysis
- risk assessment
- security policies
- operating system
- virtual machine
- management practices
- distributed environment
- intrusion detection system
- anomaly detection