Application of information leakage defendable model in enterprise intranet security

被引:0
|
作者
School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 5卷 / 761-767期
关键词
13;
D O I
10.1360/crad20070505
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Research on Enterprise Financial Accounting Information Security Model Based on Big Data
    Zhong, Ran
    Zhang, Qianying
    Zhao, Yachao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [42] A Decentralized Information Flow Model for SaaS Application Security
    Liu Tingting
    Zhao Yong
    2013 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM DESIGN AND ENGINEERING APPLICATIONS (ISDEA), 2013, : 40 - 43
  • [43] Security Games with Information Leakage: Modeling and Computation
    Xu, Haifeng
    Jiang, Albert X.
    Sinha, Arunesh
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 674 - 680
  • [44] Information visualization in information security management for enterprise's information infrastructure
    Miloslavskaya, N.
    Tolstoy, A.
    Birjukov, A.
    Scientific Visualization, 2014, 6 (02): : 74 - 91
  • [45] Data and Information Leakage Prevention Within the Scope of Information Security
    Hauer, Barbara
    IEEE ACCESS, 2015, 3 : 2554 - 2565
  • [46] Physiological Information Leakage: A New Frontier in Health Information Security
    Nia, Arsalan Mohsen
    Sur-Kolay, Susmita
    Raghunathan, Anand
    Jha, Niraj K.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2016, 4 (03) : 321 - 334
  • [47] To outsource or not: The impact of information leakage risk on information security strategy
    Feng, Nan
    Chen, Yufan
    Feng, Haiyang
    Li, Dahui
    Li, Minqiang
    INFORMATION & MANAGEMENT, 2020, 57 (05)
  • [48] Operations Management of Information Security at Enterprise Levels
    Kuokkanen, Pertti
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 160 - 167
  • [49] Enterprise Information Systems Security: A Conceptual Framework
    Chaudhry, Peggy E.
    Chaudhry, Sohail S.
    Reese, Ronald
    Jones, Darryl S.
    RE-CONCEPTUALIZING ENTERPRISE INFORMATION SYSTEMS, 2012, 105 : 118 - +
  • [50] Assessment of enterprise information security - The importance of prioritization
    Johansson, E
    Johnson, P
    Ninth IEEE International EDOC Enterprise Computing Conference, Proceedings, 2005, : 207 - 218