Добірка наукової літератури з теми "SECURITY DOMAIN ENFORCEMENT"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SECURITY DOMAIN ENFORCEMENT".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SECURITY DOMAIN ENFORCEMENT"
Camp, L. Jean. "Reconceptualizing the Role of Security User." Daedalus 140, no. 4 (October 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.
Повний текст джерелаvan Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven, and Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague." International Journal of Environmental Research and Public Health 19, no. 7 (March 26, 2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.
Повний текст джерелаGrubač, Momčilo. "Enforcement of judgments according to European legal standards." Glasnik Advokatske komore Vojvodine 75, no. 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.
Повний текст джерелаvan Hardeveld, Gert Jan, Craig Webber, and Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets." American Behavioral Scientist 61, no. 11 (October 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.
Повний текст джерелаWang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, and Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.
Повний текст джерелаYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (March 29, 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Повний текст джерелаCsaba, Zágon, and Zsolt Lippai. "The Borderline between Private and Public Security." Academic and Applied Research in Military and Public Management Science 20, no. 3 (May 26, 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Повний текст джерелаMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva, and Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES." International Journal of Advanced Research 10, no. 11 (November 30, 2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Повний текст джерелаKashmar, Nadine, Mehdi Adda, and Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.
Повний текст джерелаLysychkina, �., O. Lysychkina, and Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.
Повний текст джерелаДисертації з теми "SECURITY DOMAIN ENFORCEMENT"
Watts, Robert B. "Implementing maritime domain awareness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FWatts.pdf.
Повний текст джерелаThesis Advisor(s): Jeffrey Kline. "March 2006." Includes bibliographical references (p. 61-66). Also available online.
Jirka, Michal. "Aplikace pro zabezpečení Linuxového serveru pomocí technologie SELinux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217612.
Повний текст джерелаOikonomidis, Nikolaos [Verfasser]. "Security Policy Enforcement for Collaborating eGovernment Domains / Nikolaos Oikonomidis." Aachen : Shaker, 2007. http://d-nb.info/1170527744/34.
Повний текст джерелаSINGH, HARPREET. "ROLE BASED ACCESS CONTROL WITH SELINUX." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15485.
Повний текст джерелаКниги з теми "SECURITY DOMAIN ENFORCEMENT"
Ganz, Aurora. Fuelling Insecurity. Policy Press, 2021. http://dx.doi.org/10.1332/policypress/9781529216691.001.0001.
Повний текст джерелаЧастини книг з теми "SECURITY DOMAIN ENFORCEMENT"
Tidswell, Jonathon, and John Potter. "An approach to dynamic domain and type enforcement." In Information Security and Privacy, 26–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027941.
Повний текст джерелаSmine, Manel, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens, and Marc-Oliver Pahl. "A Priority-Based Domain Type Enforcement for Exception Management." In Foundations and Practice of Security, 65–81. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70881-8_5.
Повний текст джерелаTang, Liuying, and Sihan Qing. "A Practical Alternative to Domain and Type Enforcement Integrity Formal Models." In Information Security and Cryptology, 225–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11937807_18.
Повний текст джерелаTsudik, Gene. "Policy enforcement in stub autonomous domains." In Computer Security — ESORICS 92, 229–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/bfb0013901.
Повний текст джерелаDouglas, Guilfoyle. "Part II Predominant Security Challenges and International Law, International Security, Ch.16 Maritime Security." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0017.
Повний текст джерелаIshii, Yurika. "Unconventional Lawmaking and International Cooperation on Illegal Bunkering at Sea." In Unconventional Lawmaking in the Law of the Sea, 76—C5.P46. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192897824.003.0005.
Повний текст джерелаBerhe, Solomon, Steven A. Demurjian, Jaime Pavlich-Mariscal, Rishi Kanth Saripalle, and Alberto De la Rosa Algarín. "Leveraging UML for Access Control Engineering in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC." In Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, 916–39. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3016-0.ch042.
Повний текст джерелаDobos, Ned. "Martial Values in Civilian Life." In Ethics, Security, and The War-Machine, 104–30. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198860518.003.0006.
Повний текст джерелаKoukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, and Iakovos S. Venieris. "Privacy Compliance Requirements in Workflow Environments." In Cyber Law, Privacy, and Security, 596–618. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.
Повний текст джерелаCiorciari, John D. "Sharing Sovereignty in the Streets." In Sovereignty Sharing in Fragile States, 134–60. Stanford University Press, 2021. http://dx.doi.org/10.11126/stanford/9781503613669.003.0007.
Повний текст джерелаТези доповідей конференцій з теми "SECURITY DOMAIN ENFORCEMENT"
Pradenas, Richard. "Directional enhancement in the frequency domain of fingerprint images." In Enabling Technologies for Law Enforcement and Security, edited by Lisa A. Alyea and David E. Hoglund. SPIE, 1997. http://dx.doi.org/10.1117/12.265384.
Повний текст джерелаSwamy, Nikhil, Michael Hicks, and Simon Tsang. "Verified Enforcement of Security Policies for Cross-Domain Information Flows." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455189.
Повний текст джерелаDonnelly, Justin, Jacob Madden, Alden Roberts, Matthew Greenberg, Jeffrey Bradshaw, and Andrzej Uszok. "Dynamic policy enforcement in JBI information management services with the KAoS Policy and Domain Services." In Defense and Security Symposium, edited by Raja Suresh. SPIE, 2007. http://dx.doi.org/10.1117/12.720702.
Повний текст джерелаYuhan, Wang, Yuan Hongtao, Kong Weiwen, Yang Hankun, and Zhang Huan. "Time Domain Analysis of Single Module Movement of Deep Sea Rights Enforcement Platform." In ASME 2020 39th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/omae2020-18528.
Повний текст джерелаTical, Georgemarius, and Georgica Panfil. "PLACE AND ROLE OF NATIONAL COLLEGE OF HOME AFAIRS WITHIN SPECIAL LEARNING ENVIRONMENTS." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-019.
Повний текст джерела