Login / Signup
Usable security management with host identity protocol.
Kristiina Karvonen
Miika Komu
Andrei V. Gurtov
Published in:
AICCSA (2009)
Keyphrases
</>
security management
multi tier
security policies
network security
security issues
security measures
databases
cross organizational
database
information systems
access control
intrusion detection