共 50 条
- [31] A novel policy and information flow security model for active network [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 42 - 55
- [33] A mandatory access control policy model for information security requirements [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
- [35] Public Security Policies in the Information Society [J]. IDP-INTERNET LAW AND POLITICS, 2009, (09):
- [36] Definition of Information Systems Security Policies [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2017, 571 : 225 - 234
- [37] A Specification Language for Information Security Policies [J]. PROCEEDINGS OF THE 15TH AMERICAN CONFERENCE ON APPLIED MATHEMATICS AND PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES 2009, VOLS I AND II, 2009, : 437 - +
- [38] Motivational aspects of information security policies [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 2527 - 2532
- [39] Information policy: Policies Library and Information Services [J]. INVESTIGACION BIBLIOTECOLOGICA, 2009, 23 (49): : 7 - 10
- [40] Information Security Policy Compliance: The Role of Information Security Awareness [J]. AMCIS 2012 PROCEEDINGS, 2012,