Login / Signup
Usable set-up of runtime security policies.
Almut Herzog
Nahid Shahmehri
Published in:
Inf. Manag. Comput. Secur. (2007)
Keyphrases
</>
security policies
databases
real world
relational databases
access control
security management