Application of information leakage defendable model in enterprise intranet security

被引:0
|
作者
School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 5卷 / 761-767期
关键词
13;
D O I
10.1360/crad20070505
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A REVIEW ON ENTERPRISE INFORMATION SECURITY AND STANDARDS
    Vural, Yilmaz
    Sagiroglu, Seref
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (02): : 507 - 522
  • [32] Information security guidance for enterprise transformation
    Anderson, John A.
    Rachamadugu, Vijay
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 459 - 462
  • [33] Security of Enterprise Information Resources in Cyberspace
    Deren, Aldona
    Seretna-Salamaj, Danuta
    Skonieczny, Jan
    Kondracka, Zofia
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT III, 2020, 1052 : 262 - 275
  • [34] Optimizing Intranet topology under enterprise information system's requirements
    Shen, JJ
    Hung, TL
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2002, 2 : 392 - 397
  • [35] Application of ActiveX documents in Intranet information system
    Chen, Guohua
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (07): : 156 - 157
  • [36] A Static Analysis Model for Implicit Information Leakage in Android Application
    Cao, Hongsheng
    Jiao, Jian
    Li, Denghui
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1133 - 1140
  • [37] An Enterprise Information Model for Knowledge Transfer with Application Systems: The Current State of Enterprise GPS
    Scheruhn, Hans-Juergen
    Bayramli, Elnur
    Hintsch, Johannes
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED EDUCATION (CSEDU), VOL 2, 2020, : 278 - 289
  • [38] Knowledge management and its application model in enterprise information systems
    Zhang, L
    Ren, SJ
    Jiang, XD
    Liu, ZZ
    UNIVERSITY AS A BRIDGE FROM TECHNOLOGY TO SOCIETY, PROCEEDINGS, 2000, : 287 - 292
  • [39] The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth
    Kim, Jawon
    Lee, Chanwoo
    Chang, Hangbae
    SUSTAINABILITY, 2020, 12 (24) : 1 - 20
  • [40] Architecting Security into the Clouds: An Enterprise Security Model
    Farroha, Bassam S.
    Farroha, Deborah L.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 553 - 559