共 50 条
- [1] From trusted information security controls to a trusted information security environment [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
- [5] Understanding Information Security Policy Violation from a Situational Action Perspective [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772
- [6] Applications of trusted review to information security [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 305 - 319
- [9] Security and Privacy Concerns in Information Usability [J]. 2024 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS, WACVW 2024, 2024, : 679 - 684
- [10] An information flow security model to trusted computing system [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +