Login / Signup
Usability of Security Management: Defining the Permissions of Guests.
Matthew Johnson
Frank Stajano
Published in:
Security Protocols Workshop (2006)
Keyphrases
</>
security management
security policies
access control
multi tier
network security
cross organizational
security issues
fine grained
business process
user experience
network management