Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security control framework“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security control framework" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security control framework"
Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma und Bo Zhang. „An Information Security Assessments Framework for Power Control Systems“. Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Der volle Inhalt der QuelleAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka und Marton Gergely. „Establishing a Security Control Framework for Blockchain Technology“. Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Der volle Inhalt der QuelleLu, Bo, Ruohan Cao, Luyao Tian, Hao Wang und Yueming Lu. „FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework“. Applied Sciences 10, Nr. 1 (06.01.2020): 409. http://dx.doi.org/10.3390/app10010409.
Der volle Inhalt der QuelleJamieson, Rodger, und Graham Low. „Local Area Network Operations: A Security, Control and Audit Perspective“. Journal of Information Technology 5, Nr. 2 (Juni 1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.
Der volle Inhalt der QuelleCHEN, TSUNG-YI. „A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES“. International Journal of Software Engineering and Knowledge Engineering 19, Nr. 03 (Mai 2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.
Der volle Inhalt der QuelleBinghui, ZHENG, WANG Lijing, LI Hong und LI Xiaobao. „Technical framework for ecological security control in lakes and reservoirs“. Journal of Lake Sciences 26, Nr. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.
Der volle Inhalt der QuelleEL Yamany, Hany F., Miriam A. M. Capretz und David S. Allison. „Intelligent security and access control framework for service-oriented architecture“. Information and Software Technology 52, Nr. 2 (Februar 2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.
Der volle Inhalt der QuelleNaoui, Sarra, Mohamed Elhoucine Elhdhili und Leila Azouz Saidane. „Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security“. Wireless Personal Communications 110, Nr. 4 (16.11.2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Der volle Inhalt der QuellePavlich-Mariscal, Jaime A., Steven A. Demurjian und Laurent D. Michel. „A framework for security assurance of access control enforcement code“. Computers & Security 29, Nr. 7 (Oktober 2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.
Der volle Inhalt der QuelleHu, An Ming. „The Application Research of Lightweight J2EE Security Framework“. Advanced Materials Research 989-994 (Juli 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.
Der volle Inhalt der QuelleDissertationen zum Thema "Security control framework"
Viljoen, Melanie. „A framework towards effective control in information security governance“. Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Der volle Inhalt der QuelleBenjuma, Nuria Mahmud. „An educational framework to support industrial control system security engineering“. Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Der volle Inhalt der QuelleHuang, Qing. „An extension to the Android access control framework“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73064.
Der volle Inhalt der QuelleOkere, Irene Onyekachi. „A control framework for the assessment of information security culture“. Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Der volle Inhalt der QuelleMarin, Luis Franco. „SELinux policy management framework for HIS“. Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Der volle Inhalt der QuelleRunsewe, Olubisi Atinuke. „A Policy-Based Management Framework for Cloud Computing Security“. Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Der volle Inhalt der QuelleRadhakrishnan, Sakthi Vignesh. „A framework for system fingerprinting“. Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Der volle Inhalt der QuelleKlosinski, Vance J. „Population and resource control measures a conceptual framework for understanding and implementation“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
Sunkaralakunta, Venkatarama Reddy Rakesh. „A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications“. University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Der volle Inhalt der QuelleManning, Francis Jay. „A Framework for Enforcing Role Based Access Control in Open Source Software“. NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Der volle Inhalt der QuelleBücher zum Thema "Security control framework"
Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Den vollen Inhalt der Quelle findenPresident's Council on Integrity and Efficiency (U.S.), Hrsg. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Den vollen Inhalt der Quelle findenFighting computer crime: A new framework for protecting information. New York: Wiley, 1998.
Den vollen Inhalt der Quelle findenDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Den vollen Inhalt der Quelle findenOttawa Verification Symposium (15th 1998 Montebello, Québec). Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto: Centre for International and Security Studies, York University, 1998.
Den vollen Inhalt der Quelle findenMarshall, Beier J., Mataija Steven und York Centre for International and Strategic Studies., Hrsg. Arms control and the rule of law: A framework for peace and security in outer space : proceedings of the Fifteenth Annual Ottawa NACD Verification Symposium. Toronto,Canada: Centre for International and Security Studies, York University, 1998.
Den vollen Inhalt der Quelle findenNemati, Hamid R. Privacy solutions and security frameworks in information protection. Hershey, PA: Information Science Reference, 2013.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Army best practice initiatives : report to Congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: Improved management framework needed to guide Air Force best practice initiatives : report to congressional committees. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Defense inventory: DOD could improve Total Asset Visibility initiative with Results Act framework : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security control framework"
Tikk-Ringas, Eneken. „Legal Framework of Cyber Security“. In Intelligent Systems, Control and Automation: Science and Engineering, 109–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_8.
Der volle Inhalt der QuelleNabhen, Ricardo, Edgard Jamhour und Carlos Maziero. „A Policy Based Framework for Access Control“. In Information and Communications Security, 47–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_5.
Der volle Inhalt der QuelleKayes, A. S. M., Jun Han und Alan Colman. „ICAF: A Context-Aware Framework for Access Control“. In Information Security and Privacy, 442–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_34.
Der volle Inhalt der QuellePosthumus, Shaun, und Rossouw von Solms. „A Responsibility Framework for Information Security“. In Security Management, Integrity, and Internal Control in Information Systems, 205–21. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x_13.
Der volle Inhalt der QuelleMaity, Soumya, und Soumya K. Ghosh. „A Cognitive Trust Model for Access Control Framework in MANET“. In Information Systems Security, 75–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_6.
Der volle Inhalt der QuelleChau, Ngoc-Tu, Minh-Duong Nguyen, Seungwook Jung und Souhwan Jung. „SecaaS Framework and Architecture: A Design of Dynamic Packet Control“. In Information Security Applications, 190–201. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_15.
Der volle Inhalt der QuelleChen, Shiping, Duminda Wijesekera und Sushil Jajodia. „FlexFlow: A Flexible Flow Control Policy Specification Framework“. In Data and Applications Security XVII, 358–71. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_26.
Der volle Inhalt der QuelleZhu, Quanyan, und Zhiheng Xu. „A Game Framework to Secure Control of CBTC Systems“. In Advances in Information Security, 91–114. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60251-2_8.
Der volle Inhalt der QuelleGow, James, und Ivan Zverzžhanovski. „Rules: The Legal and Institutional Framework for Democratic Control“. In Security, Democracy and War Crimes, 83–100. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137276148_5.
Der volle Inhalt der QuelleCrampton, Jason, und Michael Huth. „Towards an Access-Control Framework for Countering Insider Threats“. In Insider Threats in Cyber Security, 173–95. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_8.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security control framework"
Berhe, Abraham Belay, Ki-Hyung Kim und Gebere Akele Tizazu. „Industrial control system security framework for ethiopia“. In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993912.
Der volle Inhalt der QuelleAftab, Farooq, Shaldon Leparan Suntu und Zhongshan Zhang. „Self-Organized Security Framework for WiGig WLAN against Attacks and Threats“. In 2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO). IEEE, 2018. http://dx.doi.org/10.1109/controlo.2018.8439750.
Der volle Inhalt der QuelleMarina, Ninoslav, Aneta Velkoska, Natasha Paunkoska und Ljupcho Baleski. „Security in Twin-code framework“. In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382437.
Der volle Inhalt der QuelleShrivas, Mahendra Kumar, Thomas Yeboah und S. Selva Brunda. „Hybrid Security Framework for Blockchain Platforms“. In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071477.
Der volle Inhalt der QuellePrunicki, Andrew, und Tzilla Elrad. „Aclamate: An AOSD Security Framework for Access Control“. In 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. IEEE, 2006. http://dx.doi.org/10.1109/dasc.2006.16.
Der volle Inhalt der QuelleKrishnan, K. Navaneeth, Roopesh Jenu, Tintu Joseph und M. L. Silpa. „Blockchain Based Security Framework for IoT Implementations“. In 2018 International CET Conference on Control, Communication, and Computing (IC4). IEEE, 2018. http://dx.doi.org/10.1109/cetic4.2018.8531042.
Der volle Inhalt der QuelleAnitha Kumari, K., G. Sudha Sadasivam, R. Senthil Prabha und G. Saranya. „Grid Based Security Framework for Online Trading“. In 2011 International Conference on Process Automation, Control and Computing (PACC). IEEE, 2011. http://dx.doi.org/10.1109/pacc.2011.5978864.
Der volle Inhalt der QuelleTao, Guo, Zhang Puhan und Liang Hongliang. „Access Control Framework for Android System“. In 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.48.
Der volle Inhalt der QuelleNeisse, Ricardo, Alexander Pretschner und Valentina Di Giacomo. „A Trustworthy Usage Control Enforcement Framework“. In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.40.
Der volle Inhalt der QuelleMohamed, Yasir Abdelgadir, und Azween B. Abdullah. „Immune inspired framework for ad hoc network security“. In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410147.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security control framework"
Wayne F. Boyer und Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), Mai 2008. http://dx.doi.org/10.2172/935471.
Der volle Inhalt der QuelleRobert P. Evans. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements. Office of Scientific and Technical Information (OSTI), September 2005. http://dx.doi.org/10.2172/911771.
Der volle Inhalt der QuelleLong, Michael, Daniel Bush, Stephen Briggs, Tapan Patel, Eileen Westervelt, Daniel Shepard, Eric Lynch und David Schwenk. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), Januar 2020. http://dx.doi.org/10.21079/11681/35294.
Der volle Inhalt der Quelle