Login / Signup

The hunt for computerized support in information security policy management.

Elham RostamiFredrik KarlssonElla Kolkowska
Published in: Inf. Comput. Secur. (2020)
Keyphrases
  • security policies
  • end users
  • data processing
  • network management
  • ubiquitous computing environments
  • information systems
  • data management
  • smart card
  • security requirements
  • directory service