Login / Signup

Identifying linkages between statements in information security policy, procedures and controls.

Vinod PathariRajendra M. Sonar
Published in: Inf. Manag. Comput. Secur. (2012)
Keyphrases
  • security policies
  • real world
  • keywords
  • query processing
  • access control
  • log files
  • privacy concerns