Login / Signup

Usable security management with host identity protocol.

Kristiina KarvonenMiika KomuAndrei V. Gurtov
Published in: AICCSA (2009)
Keyphrases
  • security management
  • multi tier
  • security policies
  • network security
  • security issues
  • security measures
  • databases
  • cross organizational
  • database
  • information systems
  • access control
  • intrusion detection