Author:Adel Bouhoula
Keyphrasesaccess control2, Access Control Policy, FDD, Firewall, formal analysis, Formal Verification and Validation, Information Systems Security, Misconfiguration, Risk, risk assessment2, risk management. |
| |||||
Copyright © 2012-2024 easychair.org. All rights reserved. |