Login / Signup
Identifying linkages between statements in information security policy, procedures and controls.
Vinod Pathari
Rajendra M. Sonar
Published in:
Inf. Manag. Comput. Secur. (2012)
Keyphrases
</>
security policies
real world
keywords
query processing
access control
log files
privacy concerns