Sara Ligaard Norgaard Hald

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation for Compliance (SEC) model offers a lightweight alternative for use by(More)
  • 1