Sign in

Analysis of privacy and security policies.

Elisa BertinoCarolyn BrodieSeraphin B. CaloLorrie Faith CranorClare-Marie KaratJohn KaratNinghui LiDan LinJorge LoboQun NiPrathima RaoXiping Wang
Published in: IBM J. Res. Dev. (2009)
Keyphrases
  • security policies
  • data analysis
  • machine learning
  • information systems