Login / Signup
The hunt for computerized support in information security policy management.
Elham Rostami
Fredrik Karlsson
Ella Kolkowska
Published in:
Inf. Comput. Secur. (2020)
Keyphrases
</>
security policies
end users
data processing
network management
ubiquitous computing environments
information systems
data management
smart card
security requirements
directory service