Assured Information Sharing: Technologies, Challenges and Directions
暂无分享,去创建一个
[1] Bhavani M. Thuraisingham. Building Trustworthy Semantic Webs , 2009, IRI.
[2] Bhavani M. Thuraisingham,et al. Standards for secure data sharing across organizations , 2007, Comput. Stand. Interfaces.
[3] Bhavani M. Thuraisingham,et al. Dependable and secure TMO scheme , 2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06).
[4] Bhavani M. Thuraisingham,et al. Database and Applications Security: Integrating Information Security and Data Management , 2005 .
[5] Bhavani M. Thuraisingham,et al. Security standards for the semantic web , 2005, Comput. Stand. Interfaces.
[6] Elisa Bertino,et al. Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.
[7] E. Schultz. Book Review: The myth of Homeland security , 2003 .
[8] Bhavani M. Thuraisingham,et al. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism , 2003 .
[9] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[10] Bhavani M. Thuraisingham,et al. Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems , 1999, IEEE Trans. Knowl. Data Eng..
[11] Bhavani Thuraisingham,et al. Data Mining: Technologies, Techniques, Tools, and Trends , 1998 .
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Martin S. Olivier. Self-protecting Objects in a Secure Federated Database , 1995, DBSec.
[14] Bhavani M. Thuraisingham,et al. An Adaptive Policy for Improved Timeliness in Secure Database Systems , 1995, DBSec.
[15] Bhavani M. Thuraisingham. Security issues for federated database systems , 1994, Comput. Secur..
[16] A. J. Jones,et al. Game Theory: Mathematical Models of Conflict , 1980 .