Login / Signup
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.
Vivien M. Rooney
Simon N. Foley
Published in:
CyberICPS/SECPRE@ESORICS (2017)
Keyphrases
</>
security policies
relational databases
user interface
real world
data mining
machine learning
end users
supervised learning
access control