Login / Signup
Evaluating usage control deterrents.
Keshnee Padayachee
Jan H. P. Eloff
Published in:
South Afr. Comput. J. (2012)
Keyphrases
</>
usage control
access control
fine grained
databases
security policies