Sign in

Applying Action Research in the Formulation of Information Security Policies.

Isabel LopesPedro Oliveira
Published in: WorldCIST (1) (2015)
Keyphrases
  • security policies
  • access control
  • machine learning
  • database
  • data analysis
  • probabilistic model
  • privacy preserving
  • security requirements