Login / Signup
Using security policies in a network securing process.
Ryma Abassi
Sihem Guemara El Fatmi
Published in:
ICT (2011)
Keyphrases
</>
security policies
network management
security requirements
access control
computer networks
information systems
data analysis
peer to peer
model selection
security management