Tuesday 28th June, 2005

prev next

Using Graph Theory to Detect Security Policy Violators

Walt Mankowski