Udo Litschauer

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Dierent security policy models have been developed and published in the past. Proven security policy models, if correctly implemented , guarantee the protection of data objects from unauthorized access or usage or prevent an illegal information ow. To verify that a security policy model has been correctly implemented, it is important to dene and execute an(More)
  • 1