Login / Signup

Enterprise Security Architecture: Mythology or Methodology?

Michelle McClintockKatrina FalknerClaudia SzaboYuval Yarom
Published in: ICEIS (2) (2020)
Keyphrases
  • security architecture
  • security policies
  • security model
  • access control
  • security mechanisms
  • databases
  • data integrity
  • data mining
  • object oriented