Your selections:
Graph representation of access controls for managing privacy, trust and security requirements
- Miller, Mirka, Skinner, Geoff
On network security and internet vulnerability
- Miller, Mirka, Patel, Deval, Patel, Keyurkumar
Privacy and e-health in Australia
- Miller, Mirka, Le Marshall, Bruce
Security issues in statistical databases and implementation of audit expert
Shield privacy Hippocratic security method for virtual community
- Skinner, Geoff, Chang, E., McMahon, M., Aisbett, J., Miller, Mirka
Are you sure you would like to clear your session, including search history and login status?