Author:Faouzi Jaidi
Keyphrasesaccess control2, Access Control Policy, formal analysis, Formal Verification and Validation, Information Systems Security, Risk, risk assessment2, risk management. |
| ||||
Copyright © 2012-2024 easychair.org. All rights reserved. |