Institutional Repository

Browsing SAICSIT Digital Archive by Author "Smuts, W"

Browsing SAICSIT Digital Archive by Author "Smuts, W"

Sort by: Order: Results:

  • Smuts, W (South African Computer Society (SAICSIT), 1999)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...
  • Smuts, W (1998)
    Most existing information security classification schemes use a 1-dimensional scale such as [top secret, secret, employee confidential, company confidential, restricted]. These classification schemes do not differentiate ...

Search UnisaIR


Browse

My Account