The PoSecCo project establishes a consistent, sustainable and traceable link between high-level security requirements and low-level security configurations, herewith aiming to support IT service providers in the effective and cost-efficient management and enforcement of security requirements. © 2012 Springer-Verlag.
CITATION STYLE
Plate, H. (2012). Policy and security configuration management. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7449 LNCS, pp. 229–231). https://doi.org/10.1007/978-3-642-32287-7_26
Mendeley helps you to discover research relevant for your work.