Login / Signup
Power Relationships in Information Systems Security Policy Formulation and Implementation.
Michael Lapke
Gurpreet Dhillon
Published in:
ECIS (2008)
Keyphrases
</>
security policies
information systems
access control
model based testing
distributed systems
network management
power consumption
database
test cases
security requirements
security management
security architecture
access control policies
ubiquitous computing environments