共 50 条
- [21] Towards Trustworthy Information Sharing by Creating Cyber Security Alliances [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1506 - 1510
- [22] MATHEMATICAL TOOLS FOR CREATING MODELS OF INFORMATION AND COMMUNICATION NETWORK SECURITY [J]. MATHEMATICS, INFORMATION TECHNOLOGIES AND APPLIED SCIENCES 2018, 2018, : 55 - 63
- [23] INFORMATION POLICY AS AN ELEMENT OF ENFORCING THE STATE'S INFORMATION SECURITY [J]. AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2022, 12 (01): : 110 - 114
- [26] Advanced Security Policy Implementation for Information Systems [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 244 - 247
- [27] Readability as a Basis for Information Security Policy Assessment [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 113 - 120
- [28] Automating Information Security Policy Compliance Checking [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
- [29] A Generic Framework for Information Security Policy Development [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 320 - 325
- [30] Rethinking FISMA and federal information security policy [J]. NEW YORK UNIVERSITY LAW REVIEW, 2006, 81 (05) : 1844 - 1874