Application of information leakage defendable model in enterprise intranet security

被引:0
|
作者
School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2007年 / 5卷 / 761-767期
关键词
13;
D O I
10.1360/crad20070505
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Development of an intranet security infrastructure and its application
    Hsu, YK
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 334 - 339
  • [22] Study Application of SSE-CMM in Enterprise Information Security Management
    Chen Zhangliang
    Wu Hengliang
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND SAFETY ENGINEERING (MSSE 2010), VOLS I AND II, 2010, : 98 - 101
  • [23] Development of the management information system for casting enterprise based on Intranet
    Cui, X.L.
    Peng, X.B.
    Lu, Z.G.
    Jiang, B.J.
    Yan, S.J.
    2001, Journal Office of Special Casting and Nonferrous Alloys
  • [24] The research on enterprise management information networks based in Intranet technology
    Ye, CM
    Zhang, FD
    Gao, Z
    ISIM'2000: PROCEEDINGS OF THE FIFTH CHINA-JAPAN INTERNATIONAL SYMPOSIUM ON INDUSTRIAL MANAGEMENT, 2000, : 420 - 423
  • [25] Research of information system based on Intranet security algorithm
    Zhan Gaofeng
    Jiang Yong
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 827 - 830
  • [26] Application of the Enterprise Model Frame for Security Requirements and Control Identification
    Kirikova, Marite
    Matulevicius, Raimundas
    Sandkuhl, Kurt
    DATABASES AND INFORMATION SYSTEMS IX, 2016, 291 : 129 - 142
  • [27] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [28] Research on Intranet service system & application of SCM software of enterprise
    Gao, G
    Wang, TY
    2005 INTERNATIONAL CONFERENCE ON SERVICES SYSTEMS AND SERVICES MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1188 - 1193
  • [29] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [30] MAJOR FACTORS OF ENTERPRISE INFORMATION SECURITY
    Zhyvko, M. O.
    Bosak, H. Z.
    ACTUAL PROBLEMS OF ECONOMICS, 2009, (98): : 67 - 74