Login / Signup

Layering Boundary Protections: An Experiment in Information Assurance.

Dale M. JohnsonLee A. Benzinger
Published in: ACSAC (2000)
Keyphrases
  • information assurance
  • information security
  • cyber security
  • information systems
  • object boundaries
  • intellectual property
  • databases
  • intrusion detection
  • case study
  • power system
  • network security