Login / Signup
Run-time security evaluation: can we afford it?
Cristina Serban
Bruce M. McMillin
Published in:
NSPW (1996)
Keyphrases
</>
security issues
access control
information security
security requirements
security mechanisms
databases
anomaly detection
intrusion detection
evaluation method
evaluation metrics
evaluation criteria
security policies
statistical databases
computer security
security systems