Results 301 to 310 of about 2,285,782 (354)
Some of the next articles are maybe not open access.

Related searches:

Security Policies for Databases

IFAC Proceedings Volumes, 1992
Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
A. M. Tjoa, Günther Pernul
openaire   +2 more sources

Multilevel Security Policies

2011
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric   +1 more
openaire   +4 more sources

Security Policies and Security Models

1982 IEEE Symposium on Security and Privacy, 1982
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Joseph A. Goguen, José Meseguer
openaire   +2 more sources

Defense and Security Policy

2017
This chapter examines what the international literature tells us about French security and defense policy, but also what the French case teaches us about this literature. French scholarship on security and defense policy has demonstrated three main trends: the legacy of Charles de Gaulle’s vision and policies, a strongly policy-oriented production, and
Irondelle, Bastien   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy