학술논문

A CIM based security policy refinement process from security objectives to concrete configurations
Document Type
Article
Source
In: International Journal of Soft Computing. (International Journal of Soft Computing, 2015, 10(6):369-382)
Subject
Language
English
ISSN
18169503