Sign in

Usability of Security Management: Defining the Permissions of Guests.

Matthew Johnson
Published in: Security Protocols Workshop (2006)
Keyphrases
  • security management
  • security policies
  • access control
  • multi tier
  • network security
  • security issues
  • cross organizational
  • database
  • databases
  • web services
  • management system
  • object oriented
  • database management systems