A methodology of developing a data security model
Kwok, Lam For (1997) A methodology of developing a data security model. .
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||QUT Thesis (PhD)|
|Additional Information:||Presented to the Information Security Research Centre, Queensland University of Technology.|
|Keywords:||Electronic data interchange Security measures, Computers Access control, Computer security Planning, computer security, hypertext systems, information security management, models, risk assessment, risk management, security systems, standards, threats, thesis, doctoral|
|Institution:||Queensland University of Technology|
|Copyright Owner:||Copyright Lam For Kwok|
|Deposited On:||22 Sep 2010 23:06|
|Last Modified:||09 Feb 2011 23:56|
Repository Staff Only: item control page