Author:Adel Bouhoula
 Keyphrasesaccess control2, Access Control Policy, FDD, Firewall, formal analysis, Formal Verification and Validation, Information Systems Security, Misconfiguration, Risk, risk assessment2, risk management.  | 
![]()  | |||||
  | |||||
| Copyright © 2012-2025 easychair.org. All rights reserved. |