共 50 条
- [31] Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2021, 337 : 85 - 98
- [32] Automatic Verification of Firewall Configurations with respect to Security Policy Requirements JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 640 - 647
- [33] Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 123 - +
- [34] Formal Modeling of Multi-Level Security and Integrity Control Implemented with SELinux 2019 ACTUAL PROBLEMS OF SYSTEMS AND SOFTWARE ENGINEERING (APSSE 2019), 2019, : 131 - 136
- [35] Analysis of network security requirement and security policy research 2000, Shanghai Comp Soc, China (26):
- [36] Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 882 - 887
- [37] ANALYSIS OF CROATIAN SECURITY POLICY GOALS CROATIAN AND COMPARATIVE PUBLIC ADMINISTRATION, 2022, 22 (04): : 735 - 764
- [38] Similarity Analysis on Heterogeneous Security Policy 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 682 - 687
- [40] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279