Login / Signup
Development of methods for identifying an appropriate benchmarking peer to establish information security policy.
Martin Kang
Anat Hovav
Euntae T. Lee
Sungyong Um
Horim Kim
Published in:
Expert Syst. Appl. (2022)
Keyphrases
</>
information processing
security policies
access control
information sharing
knowledge management
fine grained
computer networks