Security policy

Results: 30919



#Item
21Risk Assessment and Decision Support for Security Policies IEEE Policy 2011 Symposium Marco Casassa Mont (), Richard Brown ( ) Cloud & Security Lab, HP Labs Bristol, UK 1

Risk Assessment and Decision Support for Security Policies IEEE Policy 2011 Symposium Marco Casassa Mont (), Richard Brown ( ) Cloud & Security Lab, HP Labs Bristol, UK 1

Add to Reading List

Source URL: www.policy-workshop.org

Language: English - Date: 2011-06-13 06:57:17
    22Policy 662 Systems Security

    Policy 662 Systems Security

    Add to Reading List

    Source URL: oit.alabama.gov

    Language: English - Date: 2017-09-20 12:16:31
      23Verifiable Policy-Defined Networking for Security Management Dinesha Ranathunga* , Matthew Roughan* , Phil Kernick** , Nick Falkner* , Hung Nguyen* , Michelle McClintock* , Marian Mihailescu* * University of Adelaide

      Verifiable Policy-Defined Networking for Security Management Dinesha Ranathunga* , Matthew Roughan* , Phil Kernick** , Nick Falkner* , Hung Nguyen* , Michelle McClintock* , Marian Mihailescu* * University of Adelaide

      Add to Reading List

      Source URL: www.maths.adelaide.edu.au

      Language: English - Date: 2017-04-06 22:23:22
        24政策研究大学院大学  海上保安大学校 海上保安政策課程 ~Maritime Safety and Security Policy Program~

        政策研究大学院大学 海上保安大学校 海上保安政策課程 ~Maritime Safety and Security Policy Program~

        Add to Reading List

        Source URL: www.jcga.ac.jp

        Language: Japanese - Date: 2015-08-25 03:33:28
          25Third-Party Web Tracking: Policy and Technology

          Third-Party Web Tracking: Policy and Technology

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2012-05-22 01:35:23
            26Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

            Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

            Add to Reading List

            Source URL: www-sop.inria.fr

            Language: English - Date: 2018-03-27 09:23:29
              27HIGH REPRESENTATIVE OF THE UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY  EUROPEAN

              HIGH REPRESENTATIVE OF THE UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY EUROPEAN

              Add to Reading List

              Source URL: ec.europa.eu

              Language: English
                28Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum  Abstract

                Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract

                Add to Reading List

                Source URL: www.nds.rub.de

                Language: English - Date: 2017-07-13 05:46:45
                  29Baroness Catherine Ashton, EU High Representative for Foreign Affairs and Security Policy Ambassadors of the EU Political and Security Committee Date: 14 July 2014 Ref. NoPHROC Open Letter regarding the

                  Baroness Catherine Ashton, EU High Representative for Foreign Affairs and Security Policy Ambassadors of the EU Political and Security Committee Date: 14 July 2014 Ref. NoPHROC Open Letter regarding the

                  Add to Reading List

                  Source URL: www.badil.org

                  Language: English - Date: 2015-04-02 07:09:04
                    30REPÚBLICA DEMOCRÁTICA DE TIMOR-LESTE  National Food and Nutrition Security Policy May 2014

                    REPÚBLICA DEMOCRÁTICA DE TIMOR-LESTE National Food and Nutrition Security Policy May 2014

                    Add to Reading List

                    Source URL: www.laohamutuk.org

                    Language: English - Date: 2017-10-22 18:48:06