Login / Signup
Review of "Verifying security" by M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen. Computing Surveys 13, 3 (September 1981).
Dorothy E. Denning
Published in:
ACM SIGSOFT Softw. Eng. Notes (1982)
Keyphrases
</>
information security
access control
intrusion detection
security issues
artificial intelligence
network security
literature review
computer security
security systems
international conference
risk assessment
statistical databases
network management
security requirements
security threats