反
馈
意见反馈
意见反馈微信:
在线咨询:
欢迎留言吐槽:
*
发送
开通会员
输入搜索关键词
写论文
上传文档
首页
PPT模版
爱图书
PDF转换
论文生成神器
ChatGPT-4
论文辅导
APP下载
硕博脱单群
开通会员
上传文档
文献
文献
机构
写论文
全部
期刊论文
学位论文
会议论文
图书
专利
标准
外文
论文工具
提纲生成
智能定制论文提纲
摘要生成
智能推荐论文摘要
致谢生成
智能生成论文致谢
免费查重
快速、准确、安全
文献
文献
机构
开通会员
Method and apparatus for facilitating information security policy control on a per security engine user basis
微信扫码查看
QQ
新浪微博
作者:
刊名:
计算机安全
上传者:
施连敏
相关文献
批量下载下列文档
A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
Homeland security and citizen response to emergency situations: a perspective on the need for a policy approach to information access
Homeland Security and Citizen Response to Emergency Situations: A Perspective on the Need for a Policy Approach to Information Access
[Lecture Notes in Computer Science] Information and Communications Security Volume 2836 || A Policy Based Framework for Access Control
[IFIP International Federation for Information Processing] Data and Applications Security XVII Volume 142 || FlexFlow: A Flexible Flow Control Policy Specification Framework
[Lecture Notes in Computer Science] Information and Communications Security Volume 9977 || A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis
Eddy current apparatus and method for controlling a rod mill on the basis of faults detected per unit time : Graham, R.C.; Smith, J.D. U.S. Patent No. 4,1;08,926 (28 Feb. 1989)
[IFIP International Federation for Information Processing] Network Control and Engineering for QoS, Security and Mobility, III Volume 165 || On Distributed System Supervision - A Modern Approach: GeneSys
[IFIP International Federation for Information Processing] Network Control and Engineering for QoS, Security and Mobility, III Volume 165 || Network Security Management: A Formal Evaluation Tool Based on RBAC Policies
[IFIP International Federation for Information Processing] Network Control and Engineering for QoS, Security and Mobility, III Volume 165 || Network Security Management: A Formal Evaluation Tool Based on RBAC Policies
[IEEE Comput. Soc. Press 1996 IEEE Symposium on Security and Privacy - Oakland, CA, USA (6-8 May 1996)] Proceedings 1996 IEEE Symposium on Security and Privacy - A security policy model for clinical information systems
[ACM Press the 2nd ACM symposium - Singapore (2007.03.20-2007.03.22)] Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS \"07 - A framework for decentralized access control
[Communications in Computer and Information Science] Recent Trends in Computer Networks and Distributed Systems Security Volume 335 || A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
[ACM Press the 2nd international conference - North Cyprus, Turkey (2009.10.06-2009.10.10)] Proceedings of the 2nd international conference on Security of information and networks - SIN '09 - A UML profile for role-based access control
[ACM Press the 2nd international conference - North Cyprus, Turkey (2009.10.06-2009.10.10)] Proceedings of the 2nd international conference on Security of information and networks - SIN \"09 - A UML profile for role-based access control
[IEEE 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA) - Piraeus, Greece (2013.07.10-2013.07.12)] IISA 2013 - A synergistic security method for control-flow hijacking detection using SPNs
[IEEE 2018 IEEE European Symposium on Security and Privacy (EuroS&P) - London (2018.4.24-2018.4.26)] 2018 IEEE European Symposium on Security and Privacy (EuroS&P) - COVERN: A Logic for Compositional Verification of Information Flow Control
[IEEE 2018 IEEE European Symposium on Security and Privacy (EuroS&P) - London (2018.4.24-2018.4.26)] 2018 IEEE European Symposium on Security and Privacy (EuroS&P) - COVERN: A Logic for Compositional Verification of Information Flow Control
[ACM Press the 17th ACM symposium - Newark, New Jersey, USA (2012.06.20-2012.06.22)] Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12 - A cloud-based RDF policy engine for assured information sharing
【摘要】
参考文献
引证文献
100
0
收藏
微信扫码查看
免费下载
下载word版
加入VIP
无限次下载
问答
我要提问
匿名提问
我要提问
免费下载
下载word版
VIP无限次下载
该刊其他文章
打包下载
关闭广告
开通VIP,即享全站零广告
暂不开通
开通会员
爱学术会员尊享亿万文献免费下载,独享PDF转换等10多项会员专属特权
举报文档
举报原因:
广告或垃圾信息
包含色情、反社会、暴力等违规内容
涉嫌泄露他人个人信息
标题与内容不符
验证码:
换一张
确 定
取 消
如果该文档侵犯了你的合法著作权,请提交相关材料,这将有助于爱学术处理违规文档。
提交材料
PDF转WORD下载
Method and apparatus for facilitating information security policy control on a per security engine user basis
.pdf
开始转换
普通用户享有每天2次免费转换,
开通会员
不限转换次数
复制功能为VIP功能,开通VIP可无限制复制
开通VIP无限制复制
每天低至0.1元,13种特权,即可拥有
单篇下载不限
免费打包下载
pdf转word