Login / Signup
A First Step towards Security Policy Compliance of Connectors.
Sun Meng
Published in:
FSEN (2009)
Keyphrases
</>
security policies
access control
network security
security management
security concerns
security requirements
network management
distributed systems
security architecture
access control policies
home network
access control systems
knowledge management
access control mechanism
unauthorized access