Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("security policy")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 39

  • Page / 2
Export

Selection :

  • and

Database security : research and practiceBERTINO, E; JAJODIA, S; SAMARATI, P et al.Information systems (Oxford). 1995, Vol 20, Num 7, pp 537-556, issn 0306-4379Article

Firewall filtering rules analysis for anomalies detectionBOUHOULA, Adel; TRABELSI, Zouheir; BARKA, Ezedin et al.International journal of security and networks (Print). 2008, Vol 3, Num 3, pp 161-172, issn 1747-8405, 12 p.Article

Employees' adherence to information security policies: An exploratory field studySIPONEN, Mikko; MAHMOOD, M. Adam; PAHNILA, Seppo et al.Information & management. 2014, Vol 51, Num 2, pp 217-224, issn 0378-7206, 8 p.Article

Modifying Security Policies for the Satisfaction of Intransitive Non-InterferenceYEDDES, Moez; FENG LIN; HADJ-ALOUANE, Nejib Ben et al.IEEE transactions on automatic control. 2009, Vol 54, Num 8, pp 1961-1966, issn 0018-9286, 6 p.Article

Spécification et analyse d'un protocole de contrôle d'accès optimiste pour éditeurs collaboratifs répartis = Specification and verification of optimistic access control protocol for distributed collaborative editorsRANDOLPH, Aurel; IMINE, Abdessamad; BOUCHENEB, Hanifa et al.Ingénierie des systèmes d'information (2001). 2014, Vol 19, Num 6, pp 9-32, issn 1633-1311, 24 p.Article

Security policy specification for home network : Service, Security and Data Management for Ubiquitous ComputingGEON WOO KIM; DEOK GYU LEE; JONG WOOK HAN et al.International journal of ad hoc and ubiquitous computing (Print). 2009, Vol 4, Num 6, pp 372-378, issn 1743-8225, 7 p.Article

Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks : MANAGEMENT ISSUES IN THE FUTURE INTERNETJUNG, Younchan; PERADILLA, Marnel.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 6, pp 583-590, issn 1229-2370, 8 p.Article

Test fonctionnel de conformité vis-à-vis d'une politique de contrôle d'accès = Functional conformance testing towards access control policiesDADEAU, Frédéric; HADDAD, Amal; MOUTET, Thierry et al.TSI. Technique et science informatiques. 2009, Vol 28, Num 4, pp 533-563, issn 0752-4072, 31 p.Article

The effects of multilevel sanctions on information security violations: A mediating modelGUO, Ken H; YUAN, Yufei.Information & management. 2012, Vol 49, Num 6, pp 320-326, issn 0378-7206, 7 p.Article

Runtime verification using policy-based approach to control information flowSARRAB, Mohamed.International journal of security and networks (Print). 2013, Vol 8, Num 4, pp 212-230, issn 1747-8405, 19 p.Article

Spécification et mécanisme de détection de flots d'information illégaux = Illegal information flow specification and detection mechanismJAUME, Mathieu; VIET TRIEM TONG, Valérie; HIET, Guillaume et al.TSI. Technique et science informatiques. 2012, Vol 31, Num 6, pp 713-742, issn 0752-4072, 30 p.Conference Paper

Security policy model for an MIS designed for the defense sectorPETROPOULOS, Fotios; PAGOURTZI, Elli; BOUGIOUKOS, Nikolaos et al.International journal of services and standards (Print). 2008, Vol 4, Num 4, pp 407-414, issn 1740-8849, 8 p.Article

Modèle de sécurité pour le secteur de la santé = Security model for the health sectorEL KALAM, Anas Abou; DESWARTE, Yves.TSI. Technique et science informatiques. 2004, Vol 23, Num 3, pp 291-321, issn 0752-4072, 31 p.Article

Re-evaluating Russia's biological weapons policy, as reflected in the criminal code and official admissions : Insubordination leading to a president's subordinationKNOPH, Jan T; WESTERDAHL, Kristina S.Critical reviews in microbiology. 2006, Vol 32, Num 1, pp 1-13, issn 1040-841X, 13 p.Article

On the implementation of security policies with adaptative encryptionMANZANARES, Antonio Izquierdo; SIERRA CAMARA, Jose M; TORRES MARQUEZ, Joaquin et al.Computer communications. 2006, Vol 29, Num 15, pp 2750-2758, issn 0140-3664, 9 p.Article

Firmato: A novel firewall management toolkitBARTAL, Yair; MAYER, Alain; NISSIM, Kobbi et al.ACM transactions on computer systems. 2004, Vol 22, Num 4, pp 381-420, issn 0734-2071, 40 p.Article

A MAC policy framework for multilevel relational databases : Special issue on secure database systems technologyQIAN, X; LUNT, T. F.IEEE transactions on knowledge and data engineering. 1996, Vol 8, Num 1, pp 3-15, issn 1041-4347Article

The information security policy unpacked: A critical study of the content of university policiesDOHERTY, Neil Francis; ANASTASAKIS, Leonidas; FULFORD, Heather et al.International journal of information management. 2009, Vol 29, Num 6, pp 449-457, issn 0268-4012, 9 p.Article

Access control in mobile ambient calculi : A comparative viewMARGARIA, Ines; ZACCHI, Maddalena.Theoretical computer science. 2008, Vol 398, Num 1-3, pp 183-202, issn 0304-3975, 20 p.Article

Script-templates for the Content Security Policy : Threat Detection, Analysis & DefenseJOHNS, Martin.Journal of information security and applications. 2014, Vol 19, Num 3, pp 209-223, 15 p.Article

Security policy space definition and structuringTRCEK, D; JERMAN-BLAZIC, B; PAVESIC, N et al.Computer standards & interfaces. 1996, Vol 18, Num 2, pp 191-195, issn 0920-5489Article

A contribuição de David Garland : a sociologia da punição = The work of David Garland : the sociology of punishment = Les travaux de David Garland : la sociologie du châtimentSALLA, Fernando; GAUTO, Maite; CESAR ALVAREZ, Marcos et al.Tempo social. 2006, Vol 18, Num 1, pp 329-350, issn 0103-2070, 22 p.Article

Enforceable Security Policies RevisitedBASIN, David; JUGE, Vincent; KLAEDTKE, Felix et al.ACM transactions on information and system security. 2013, Vol 16, Num 1, issn 1094-9224, 3.1-3.26Article

Secure distributed intelligent networks : Internet SecurityKOTZANIKOLAOU, Panayiotis; MAVROPODI, Roza; DOULIGERIS, Christos et al.Computer communications. 2006, Vol 29, Num 3, pp 325-336, issn 0140-3664, 12 p.Article

Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems : The SAFES Perspective : Configurable Computing Design-II: Hardware Level ReconfigurationGOGNIAT, Guy; WOLF, Tilman; BURLESON, Wayne et al.IEEE transactions on very large scale integration (VLSI) systems. 2008, Vol 16, Num 2, pp 144-155, issn 1063-8210, 12 p.Article

  • Page / 2