Application of information leakage defendable model in enterprise intranet security

被引:0
|
作者
School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 5卷 / 761-767期
关键词
13;
D O I
10.1360/crad20070505
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A New Information Leakage Defendable Model
    Liu, Shufen
    Zhang, Zhengxiang
    Cui, Yaorui
    Wu, Lintao
    9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 109 - 112
  • [2] Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
    Wang, Hao
    Li, Junhao
    Liu, Dong
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 72 - 76
  • [3] A Security Risk Assessment Framework for the Enterprise Intranet
    Lou, Fang
    Tian, Zhi-hong
    Fu, Yun-sheng
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION (ICEEA 2016), 2016,
  • [4] Model of enterprise's information security management
    Omelchenko, Tatiana
    Umnitsyn, Mikhail
    Nikishova, Arina
    Sadovnikova, Natalia
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 182 - 187
  • [5] Intranet application security checklist
    INFOSEC Engineering
    Comput Secur J, 1 (47-53):
  • [6] Behavioural Analysis for Prevention of Intranet Information Leakage
    Manmadhan, Neenu
    Achuthan, Krishnashree
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1535 - 1537
  • [7] Designing an Enterprise Security Strategy for Mobile Intranet Access
    Trojahn, Matthias
    Ortmeier, Frank
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 8 - 15
  • [8] Design of Intranet Information Security Management
    Ye Yalin
    Sun Weifeng
    Shan Ning
    Guo Chaoping
    Wu Xi
    2016 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS), 2016, : 155 - 158
  • [9] A security evaluation model and toolkit for enterprise information systems
    Yan, Q.
    FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 27 - 32
  • [10] Design for Prevention of Intranet Information Leakage via Emails
    Manmadhan, Neenu
    Narayanan, Hari
    Poroor, Jayaraj
    Achuthan, Krishnashree
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 136 - 148