Implementing Knowledge Management Techniques for Security Purposes.
Petros BelsisStefanos GritzalisChristos SkourlasIoannis DrakopoulosPublished in: ICEIS (2) (2004)
Keyphrases
- knowledge management
- knowledge engineering
- access control
- information security
- intrusion detection
- information systems
- network security
- knowledge sharing
- security issues
- security problems
- e government
- security policies
- security threats
- security systems
- computer security
- security analysis
- tacit knowledge
- knowledge reuse
- ontological engineering
- information assurance
- security mechanisms
- security requirements
- software development
- data security
- security level
- java card
- network management
- information sharing
- case based reasoning
- information technology