Login / Signup
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology.
Paulina Januszkiewicz
Marek Pyka
Published in:
ARES (2007)
Keyphrases
</>
security policies
access control
network security
security management
distributed systems
security concerns
access control systems
network management
security requirements
ubiquitous computing environments
machine learning
relational databases
fine grained
model based testing