Figure3
From: Crafting organizational security policies for critical infrastructures: an architectural approach
![Crafting organizational security policies for critical infrastructures: an architectural approach](https://image.oaes.cc/c3cefa6d-347b-48a5-97e0-b5e417ac49b8/jsss4040-3.jpg)
Figure 3. Evaluating security requirements of solution architectures.
Figure 3. Evaluating security requirements of solution architectures.
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/