Login / Signup
Enterprise Security Architecture: Mythology or Methodology?
Michelle McClintock
Katrina Falkner
Claudia Szabo
Yuval Yarom
Published in:
ICEIS (2) (2020)
Keyphrases
</>
security architecture
security policies
security model
access control
security mechanisms
databases
data integrity
data mining
object oriented