Specification and querying of security constraints in the EFSOC framework
Proceedings of the 2nd international conference on Service oriented computing
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
From the Publisher:Completely revised and updated, the Handbook of Information Security Management 1998 continues to report how the best and the brightest security experts handle some of the most challenging security problems. The Handbook of Information Security Management 1998 provides dozens of case studies and analyses showing you how to protect your data systems and data.