Sign in
Requirements for computerized tools to design information security policies.
Elham Rostami
Fredrik Karlsson
Shang Gao
Published in:
Comput. Secur. (2020)
Keyphrases
</>
end users
security policies
design decisions
design principles
databases
information systems
relational databases