Login / Signup
A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation.
Jeffrey May
Gurpreet Dhillon
Published in:
ECIS (2010)
Keyphrases
</>
security analysis
security requirements
security policies
databases
anomaly detection
data integration
fine grained
information sharing
network traffic