Login / Signup
Protecting software and confidential information.
John Warchus
Published in:
Comput. Law Secur. Rev. (1999)
Keyphrases
</>
confidential information
information loss
confidential data
statistical databases
access control
database
data sets
medical images
data management
decision rules