Return to Article Details SECURITY PARAMETERS IN THE PROTECTION OF INFORMATION SYSTEMS Download Download PDF