INDEX

Abnormal events, in scientific study of industrial process control systems, 2:1137

Absorbance peak, 3:1991

Abstraction

in classifying vulnerabilities, 2:949950

high assurance and, 2:1082

Academic terrorism risk research, 1:256

Academy of Cryptography, in Russia, 2:842

Accelerated approval regulations, 4:2532, 2534

Acceptability, of secure systems, 2:1110

Access

to food service operations, 3:17211722

SOA security and, 2:1104

Access control, 2:965974; 3:2079, 2086

application-level mechanisms for, 2:971

authentication and authorization in, 2:965968

defending against malevolent insiders using, 1:593603

in distributed platforms/systems, 2:1092

emerging solutions for, 2:972973

enforcing, 1:623

funding, 1:602

interoperability issues in, 2:971972

privilege management and, 2:968971

research directions in, 1:602

Access control features, applied against insider threats, 1:599602

Access control lists (ACLs)

in discretionary access control, 2:969, 972

in security policy, 2:1026

Trojan horses and, 2:1037

Access control policy, enforcing, 2:968971

Access control portals, 1:596

Access control technology, 1:595599

Access to information laws, 4:21252126

Accidental events, 4:23272328

Accidental fatalities, in various energy chain stages, 4:2338

Accident records, in the ENSAD database, 4:2335

Accident risks, in the energy sector, 4:23292330

Accidents, catastrophic, 1:27

Accident scenarios, 1:162, 163

Accident sequences, 1:163

Accountability/scrutability principle, 3:1567

Accreditation ...

Get Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.