Archive > Volume 28 Issue 2 > 2005,28(2):85-88. DOI:10.11835/j.issn.1000-582X.2005.02.023 CSTR:[cstr] Prev Next

Target-based Security Management Architecture Applied to Management Information System