Developing Internet Security Policy for Organizations.
Sharman LichtensteinPublished in: HICSS (4) (1997)
Keyphrases
- security policies
- access control
- ubiquitous computing environments
- security requirements
- security management
- distributed systems
- network security
- information systems
- network management
- information technology
- access control policies
- security concerns
- security mechanisms
- security architecture
- home network
- knowledge management
- internet access
- databases
- unauthorized access