Sign in

An approach for deploying and monitoring dynamic security policies.

José Miguel HorcasMónica PintoLidia FuentesWissam MallouliEdgardo Montes de Oca
Published in: Comput. Secur. (2016)
Keyphrases