Sign in
Usability of Security Management: Defining the Permissions of Guests.
Matthew Johnson
Published in:
Security Protocols Workshop (2006)
Keyphrases
</>
security management
security policies
access control
multi tier
network security
security issues
cross organizational
database
databases
web services
management system
object oriented
database management systems