Login / Signup
Tailoring Policies and Involving Users in Constructing Security Policies - A Mapping Study.
Elham Rostami
Published in:
HAISA (2019)
Keyphrases
</>
security policies
end users
access control
access control policies
database
databases
metadata
data mining techniques
user groups