Login / Signup
Policy-driven model for security management.
Karima Boudaoud
Charles McCathieNevile
Published in:
Net-Con (2002)
Keyphrases
</>
security management
data mining
database systems
low cost
mobile phone