@dblp

Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.

, , , , and . HICSS, page 5201-5210. IEEE Computer Society, (2015)

Links and resources

Tags