Login / Signup
A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment.
Haena Kim
Yejun Kim
Seungjoo Kim
Published in:
CoRR (2024)
Keyphrases
</>
requirements analysis
databases
case study
access control
intrusion detection
lessons learned
information security