Login / Signup
A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs.
Golnaz Elahi
Eric S. K. Yu
Published in:
ER (2007)
Keyphrases
</>
trade off
information security
artificial intelligence
databases
neural network
access control
intrusion detection
security issues
security requirements
real time
data sets
mobile devices
cloud computing