Article,

Usable set-up of runtime security policies.

, and .
Inf. Manag. Comput. Secur., 15 (5): 394-407 (2007)

Meta data

Tags

    Users

    Comments and Reviews