Login / Signup
Security Policy Enforcement Through Refinement Process.
Nicolas Stouls
Marie-Laure Potet
Published in:
B (2007)
Keyphrases
</>
policy enforcement
refinement process
access control
security management
enterprise network
security issues
security policies
multi tier
intrusion detection
information security
network security
attack graph