Smuts, W
(South African Computer Society (SAICSIT), 1999)
Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...