Login / Signup

Using security policies in a network securing process.

Ryma AbassiSihem Guemara El Fatmi
Published in: ICT (2011)
Keyphrases
  • security policies
  • network management
  • security requirements
  • access control
  • computer networks
  • information systems
  • data analysis
  • peer to peer
  • model selection
  • security management