Decision centric identification and rank ordering of security metrics.
Moazzam KhanMohammad OmerJohn A. CopelandPublished in: LCN (2012)
Keyphrases
- access control
- information security
- decision makers
- intrusion detection
- security problems
- computer security
- decision process
- decision making
- statistical databases
- functional requirements
- partial order
- security policies
- similarity metrics
- security management
- information systems
- security requirements
- evaluation metrics
- security mechanisms
- key management
- security model
- security level
- computer networks
- security measures