Login / Signup
Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.
Jim Alves-Foss
Jia Song
A. Scott Amack
Lawrence Kerr
Stuart Steiner
Published in:
HICSS (2015)
Keyphrases
</>
policy enforcement
access control
security issues
security mechanisms
security management
information security
enterprise network
intrusion detection
network security
security requirements
security policies
rfid tags
databases
social networks
neural network
operating system