Literatura académica sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "SECURITY DOMAIN ENFORCEMENT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Camp, L. Jean. "Reconceptualizing the Role of Security User". Daedalus 140, n.º 4 (octubre de 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.
Texto completovan Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven y Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague". International Journal of Environmental Research and Public Health 19, n.º 7 (26 de marzo de 2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.
Texto completoGrubač, Momčilo. "Enforcement of judgments according to European legal standards". Glasnik Advokatske komore Vojvodine 75, n.º 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.
Texto completovan Hardeveld, Gert Jan, Craig Webber y Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets". American Behavioral Scientist 61, n.º 11 (octubre de 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.
Texto completoWang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa y Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 de julio de 2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.
Texto completoYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang y Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, n.º 7 (29 de marzo de 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Texto completoCsaba, Zágon y Zsolt Lippai. "The Borderline between Private and Public Security". Academic and Applied Research in Military and Public Management Science 20, n.º 3 (26 de mayo de 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Texto completoMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva y Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES". International Journal of Advanced Research 10, n.º 11 (30 de noviembre de 2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Texto completoKashmar, Nadine, Mehdi Adda y Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities". Journal of Cybersecurity and Privacy 2, n.º 1 (14 de febrero de 2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.
Texto completoLysychkina, �., O. Lysychkina y Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT". Scientific journal of the National Academy of National Guard "Honor and Law" 2, n.º 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.
Texto completoTesis sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Watts, Robert B. "Implementing maritime domain awareness". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FWatts.pdf.
Texto completoThesis Advisor(s): Jeffrey Kline. "March 2006." Includes bibliographical references (p. 61-66). Also available online.
Jirka, Michal. "Aplikace pro zabezpečení Linuxového serveru pomocí technologie SELinux". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217612.
Texto completoOikonomidis, Nikolaos [Verfasser]. "Security Policy Enforcement for Collaborating eGovernment Domains / Nikolaos Oikonomidis". Aachen : Shaker, 2007. http://d-nb.info/1170527744/34.
Texto completoSINGH, HARPREET. "ROLE BASED ACCESS CONTROL WITH SELINUX". Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15485.
Texto completoLibros sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Ganz, Aurora. Fuelling Insecurity. Policy Press, 2021. http://dx.doi.org/10.1332/policypress/9781529216691.001.0001.
Texto completoCapítulos de libros sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Tidswell, Jonathon y John Potter. "An approach to dynamic domain and type enforcement". En Information Security and Privacy, 26–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027941.
Texto completoSmine, Manel, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens y Marc-Oliver Pahl. "A Priority-Based Domain Type Enforcement for Exception Management". En Foundations and Practice of Security, 65–81. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70881-8_5.
Texto completoTang, Liuying y Sihan Qing. "A Practical Alternative to Domain and Type Enforcement Integrity Formal Models". En Information Security and Cryptology, 225–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11937807_18.
Texto completoTsudik, Gene. "Policy enforcement in stub autonomous domains". En Computer Security — ESORICS 92, 229–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/bfb0013901.
Texto completoDouglas, Guilfoyle. "Part II Predominant Security Challenges and International Law, International Security, Ch.16 Maritime Security". En The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0017.
Texto completoIshii, Yurika. "Unconventional Lawmaking and International Cooperation on Illegal Bunkering at Sea". En Unconventional Lawmaking in the Law of the Sea, 76—C5.P46. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192897824.003.0005.
Texto completoBerhe, Solomon, Steven A. Demurjian, Jaime Pavlich-Mariscal, Rishi Kanth Saripalle y Alberto De la Rosa Algarín. "Leveraging UML for Access Control Engineering in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC". En Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, 916–39. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3016-0.ch042.
Texto completoDobos, Ned. "Martial Values in Civilian Life". En Ethics, Security, and The War-Machine, 104–30. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198860518.003.0006.
Texto completoKoukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani y Iakovos S. Venieris. "Privacy Compliance Requirements in Workflow Environments". En Cyber Law, Privacy, and Security, 596–618. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.
Texto completoCiorciari, John D. "Sharing Sovereignty in the Streets". En Sovereignty Sharing in Fragile States, 134–60. Stanford University Press, 2021. http://dx.doi.org/10.11126/stanford/9781503613669.003.0007.
Texto completoActas de conferencias sobre el tema "SECURITY DOMAIN ENFORCEMENT"
Pradenas, Richard. "Directional enhancement in the frequency domain of fingerprint images". En Enabling Technologies for Law Enforcement and Security, editado por Lisa A. Alyea y David E. Hoglund. SPIE, 1997. http://dx.doi.org/10.1117/12.265384.
Texto completoSwamy, Nikhil, Michael Hicks y Simon Tsang. "Verified Enforcement of Security Policies for Cross-Domain Information Flows". En MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455189.
Texto completoDonnelly, Justin, Jacob Madden, Alden Roberts, Matthew Greenberg, Jeffrey Bradshaw y Andrzej Uszok. "Dynamic policy enforcement in JBI information management services with the KAoS Policy and Domain Services". En Defense and Security Symposium, editado por Raja Suresh. SPIE, 2007. http://dx.doi.org/10.1117/12.720702.
Texto completoYuhan, Wang, Yuan Hongtao, Kong Weiwen, Yang Hankun y Zhang Huan. "Time Domain Analysis of Single Module Movement of Deep Sea Rights Enforcement Platform". En ASME 2020 39th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/omae2020-18528.
Texto completoTical, Georgemarius y Georgica Panfil. "PLACE AND ROLE OF NATIONAL COLLEGE OF HOME AFAIRS WITHIN SPECIAL LEARNING ENVIRONMENTS". En eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-019.
Texto completo