Login / Signup

What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.

Vivien M. RooneySimon N. Foley
Published in: CyberICPS/SECPRE@ESORICS (2017)
Keyphrases
  • security policies
  • relational databases
  • user interface
  • real world
  • data mining
  • machine learning
  • end users
  • supervised learning
  • access control