6th Joint IFIP Wireless and Mobile Networking Conference (WMNC) 2013
DOI: 10.1109/wmnc.2013.6549056
|View full text |Cite
|
Sign up to set email alerts
|

Security access control research trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Starting with the prevention phase in which the design and implementation of security policies, processes, and controls is done. Security programs and access controls form the main components of security policies (Fathy et al, 2013).…”
mentioning
confidence: 99%
“…Starting with the prevention phase in which the design and implementation of security policies, processes, and controls is done. Security programs and access controls form the main components of security policies (Fathy et al, 2013).…”
mentioning
confidence: 99%