Login / Signup
Layering Boundary Protections: An Experiment in Information Assurance.
Dale M. Johnson
Lee A. Benzinger
Published in:
ACSAC (2000)
Keyphrases
</>
information assurance
information security
cyber security
information systems
object boundaries
intellectual property
databases
intrusion detection
case study
power system
network security