Sign in

Requirements for computerized tools to design information security policies.

Elham RostamiFredrik KarlssonShang Gao
Published in: Comput. Secur. (2020)
Keyphrases
  • end users
  • security policies
  • design decisions
  • design principles
  • databases
  • information systems
  • relational databases