Symbiosis Among IT Security Standards, Policies, and Criteria.
Marshall D. AbramsPublished in: Security and Control of Information Technology in Society (1993)
Keyphrases
- iso iec
- access control
- intrusion detection
- role based access control
- computer security
- security issues
- international standard
- security systems
- security requirements
- security policies
- network security
- information security
- security management
- web services
- security level
- optimal policy
- anomaly detection
- information assurance
- functional requirements
- security problems
- international standards
- access control policies
- widely accepted
- intrusion detection system
- security model
- key management
- security mechanisms
- multi criteria
- distributed systems