The people risks the creation of a corporate security policy.
David DaviesPublished in: Comput. Law Secur. Rev. (1989)
Keyphrases
- security policies
- access control
- network security
- security management
- distributed systems
- security concerns
- network management
- security requirements
- case study
- security architecture
- access control systems
- risk management
- home network
- knowledge management
- ubiquitous computing environments
- fine grained
- unauthorized access
- database
- access control mechanism
- access control policies
- security measures
- semi supervised
- information systems