Login / Signup

Validation of IS Security Policies Featuring Authorisation Constraints.

Yves LedruAkram IdaniJérémy MilhauNafees QamarRégine LaleauJean-Luc RichierMohamed-Amine Labiadh
Published in: Int. J. Inf. Syst. Model. Des. (2015)
Keyphrases