Login / Signup

A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment.

Haena KimYejun KimSeungjoo Kim
Published in: CoRR (2024)
Keyphrases
  • requirements analysis
  • databases
  • case study
  • access control
  • intrusion detection
  • lessons learned
  • information security