Sign in

Development of methods for identifying an appropriate benchmarking peer to establish information security policy.

Martin KangAnat HovavEuntae T. LeeSungyong UmHorim Kim
Published in: Expert Syst. Appl. (2022)
Keyphrases
  • information processing
  • security policies
  • access control
  • information sharing
  • knowledge management
  • fine grained
  • computer networks