Login / Signup

Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.

Jim Alves-FossJia SongA. Scott AmackLawrence KerrStuart Steiner
Published in: HICSS (2015)
Keyphrases