Login / Signup

Enabling change-driven workflows in continuous information security management.

Michael BrunnerAndrea MussmannRuth Breu
Published in: SAC (2019)
Keyphrases
  • information security management
  • information security
  • data processing
  • security management
  • risk management
  • business processes
  • network security