Login / Signup

Usable set-up of runtime security policies.

Almut HerzogNahid Shahmehri
Published in: Inf. Manag. Comput. Secur. (2007)
Keyphrases
  • security policies
  • databases
  • real world
  • relational databases
  • access control
  • security management