共 50 条
- [41] An information flow security policy verification methodology and its application in operating systems Proceedings of the 11th Joint International Computer Conference, 2005, : 700 - 703
- [42] Decentralized Personal Cloud Data Model and its Application in Campus Health Information System 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 879 - 883
- [43] Multi-level Index Model for SaaS Application 2013 10TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA 2013), 2013, : 23 - +
- [44] Static Gate-Level Information Flow for Hardware Information Security with Bounded Model Checking 2024 IEEE 42ND VLSI TEST SYMPOSIUM, VTS 2024, 2024,
- [45] Parts inventory information integrated security technology of automobile industry chain SaaS platform Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2020, 26 (05): : 1277 - 1285
- [46] Integrated Query of Multi-resources Information in the way of SaaS Application INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2665 - 2668
- [47] Hybrid Flow Model of Cyber Physical Distribution Network and an Instantiated Decentralized Control Application CSEE JOURNAL OF POWER AND ENERGY SYSTEMS, 2024, 10 (06): : 2587 - 2596
- [48] The security model to combine the corporate and information security TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 305 - 316
- [49] Application of Java']Java Security Architecture in Information Security PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69