Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Figure 1

Methodology of deployment and management of the compliance of trusted policies.