Login / Signup
Security policy update.
Chris Pounder
Published in:
Comput. Secur. (2002)
Keyphrases
</>
security policies
access control
network security
security management
distributed systems
security requirements
network management
security architecture
security concerns
access control systems
ubiquitous computing environments
home network
access control policies
fine grained
unauthorized access
event logs