Login / Signup
Reliable Process for Security Policy Deployment
Stere Preda
Nora Cuppens-Boulahia
Frédéric Cuppens
Joaquín García-Alfaro
Laurent Toutain
Published in:
CoRR (2009)
Keyphrases
</>
security policies
databases
access control
security management
machine learning
process model
network security
security requirements