The Implementation with the Network Data Security on the Secure Desktop
暂无分享,去创建一个
[1] Pan Jun-yu. Analysis on Internal Network Safety Threat and Prevention , 2008 .
[2] Stamatios V. Kartalopoulos,et al. Differentiating Data Security and Network Security , 2008, 2008 IEEE International Conference on Communications.
[3] Liao Wei. Security management function design of computer security defence system , 2010 .
[4] Liu Hong-yi. Research and Design of Security Support Model in the Intranet , 2007 .
[5] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.
[6] Olalekan Adeyinka,et al. Internet Attack Methods and Internet Security Technology , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).
[7] Ahmad-Reza Sadeghi,et al. Trusted Virtual Domains - Design, Implementation and Lessons Learned , 2009, INTRUST.
[8] Chris I. Dalton,et al. Towards automated security policy enforcement in multi-tenant virtual data centers , 2010, J. Comput. Secur..