暂无分享,去创建一个
Zainab Alansari | Safeeullah Soomro | Mohammad Riyaz Belgaum | Abdul Ahad Abro | Abdul Baqi Khan Khakwani
[1] Jie Ma,et al. A novel real-time aggregation method on network security events , 2011, Kybernetes.
[2] K. SangeethaM,et al. The Study of E-Commerce Security Issues and Solutions , 2018 .
[3] Eric Torng,et al. Compressing Network Access Control Lists , 2011, IEEE Transactions on Parallel and Distributed Systems.
[4] Bashar Nuseibeh,et al. Resolving vulnerability identification errors using security requirements on business process models , 2013, Inf. Manag. Comput. Secur..
[5] Ankur Singhal,et al. Network Security Using Cryptographic Techniques , 2012 .
[6] Ryan Ausanka-Crues,et al. Methods for Access Control : Advances and Limitations , 2006 .
[7] Martín Abadi,et al. Access Control in a World of Software Diversity , 2005, HotOS.
[8] D. Goderis,et al. Service level agreements: a main challenge for next generation networks , 2002, 2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563).
[9] Sridhar P. Nerur,et al. A framework for analyzing e-commerce security , 2002, Inf. Manag. Comput. Secur..