Towards Modelling the Impact of Security Policy on Compliance.
Winfred YaokumahSteven BrownAlex Ansah DawsonPublished in: J. Inf. Technol. Res. (2016)
Keyphrases
- security policies
- access control
- distributed systems
- security management
- security concerns
- network security
- network management
- security requirements
- security architecture
- ubiquitous computing environments
- access control systems
- database
- access control policies
- machine learning
- computing systems
- access control mechanism