Keyphrases
- intrusion detection
- security issues
- information security
- security requirements
- network security
- high security
- database
- security policies
- security mechanisms
- genetic algorithm
- access control
- functional requirements
- security properties
- security problems
- security threats
- databases
- information sharing
- e government
- end users
- website
- key management
- security management