Login / Signup
Security policies.
Ross J. Anderson
Frank Stajano
Jong-Hyeon Lee
Published in:
Adv. Comput. (2001)
Keyphrases
</>
security policies
access control
network security
security management
security concerns
distributed systems
security requirements
access control systems
home network
multilevel secure
unauthorized access
databases
access control policies
cyber attacks
intrusion detection
anomaly detection
real world