INDEX
Abnormal events, in scientific study of industrial process control systems, 2:1137
Absorbance peak, 3:1991
Abstraction
in classifying vulnerabilities, 2:949–950
high assurance and, 2:1082
Academic terrorism risk research, 1:256
Academy of Cryptography, in Russia, 2:842
Accelerated approval regulations, 4:2532, 2534
Acceptability, of secure systems, 2:1110
Access
to food service operations, 3:1721–1722
SOA security and, 2:1104
Access control, 2:965–974; 3:2079, 2086
application-level mechanisms for, 2:971
authentication and authorization in, 2:965–968
defending against malevolent insiders using, 1:593–603
in distributed platforms/systems, 2:1092
emerging solutions for, 2:972–973
enforcing, 1:623
funding, 1:602
interoperability issues in, 2:971–972
privilege management and, 2:968–971
research directions in, 1:602
Access control features, applied against insider threats, 1:599–602
Access control lists (ACLs)
in discretionary access control, 2:969, 972
in security policy, 2:1026
Trojan horses and, 2:1037
Access control policy, enforcing, 2:968–971
Access control portals, 1:596
Access control technology, 1:595–599
Access to information laws, 4:2125–2126
Accidental events, 4:2327–2328
Accidental fatalities, in various energy chain stages, 4:2338
Accident records, in the ENSAD database, 4:2335
Accident risks, in the energy sector, 4:2329–2330
Accidents, catastrophic, 1:27
Accident scenarios, 1:162, 163
Accident sequences, 1:163
Accountability/scrutability principle, 3:1567
Accreditation ...
Get Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.