A Software Engineering Approach for Access Control to Multi-Level-Security Documents
暂无分享,去创建一个
[1] Hassan Mathkour,et al. An integrated statistical comparative analysis between variant genetic datasets of Mus musculus , 2009, CI 2009.
[2] Ernesto Damiani,et al. Design and implementation of an access processor for xml documents , 2000 .
[3] Yi Pan,et al. Partitioned optimization algorithms for multiple sequence alignment , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[4] Ping Ma,et al. An Improved Ant Colony Algorithm for DNA Sequence Alignment , 2008, 2008 International Symposium on Information Science and Engineering.
[5] Chou-Yuan Lee,et al. An Intelligent System for Multiple Sequences Alignment , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.
[6] Mohammad Alhammouri,et al. Management of Groups and Group Keys in Multi-level Security Environments , 2007, SAFECOMP.
[7] Ankit Agrawal,et al. Pairwise DNA Alignment with Sequence Specific Transition-Transversion Ratio Using Multiple Parameter Sets , 2008, 2008 International Conference on Information Technology.
[8] Dan He,et al. An improved algorithm for the regular expression constrained multiple sequence alignment problem , 2006, Sixth IEEE Symposium on BioInformatics and BioEngineering (BIBE'06).
[9] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[10] Rey-Long Liu. Interactive high-quality text classification , 2008, Inf. Process. Manag..
[11] R. Abdullah,et al. Fast Dynamic Programming Based Sequence Alignment Algorithm , 2006, The 2nd International Conference on Distributed Frameworks for Multimedia Applications.
[12] Srinivas Aluru,et al. Space and time optimal parallel sequence alignments , 2004, IEEE Transactions on Parallel and Distributed Systems.
[13] J. Anttila,et al. Information Security Standards and Global Business , 2006, 2006 IEEE International Conference on Industrial Technology.
[14] S. Muftic,et al. A Design of an Access Control Model for Multilevel-Security Documents , 2008, 2008 10th International Conference on Advanced Communication Technology.
[15] H.L. Armstrong,et al. Mapping information security curricula to professional accreditation standards , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[16] Makoto Murata,et al. XML access control using static analysis , 2006, TSEC.
[17] Jin Zhang,et al. An empirical study of sentiment analysis for chinese documents , 2008, Expert Syst. Appl..
[18] Sara Nasser,et al. Multiple Sequence Alignment using Fuzzy Logic , 2007, 2007 IEEE Symposium on Computational Intelligence and Bioinformatics and Computational Biology.
[19] Ridvan Saraçoglu,et al. A new approach on search for similar documents with multiple categories using fuzzy clustering , 2008, Expert Syst. Appl..
[20] Linda G. Wallace,et al. Is Information Security Under Control?: Investigating Quality in Information Security Management , 2007, IEEE Security & Privacy.
[21] Jan H. P. Eloff,et al. Security classification for documents , 1996, Comput. Secur..