Login / Signup

Adapting usage control as a deterrent to address the inadequacies of access controls.

Keshnee PadayacheeJan H. P. Eloff
Published in: Comput. Secur. (2009)
Keyphrases