Network Security's security management tool

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:121 / 122
页数:2
相关论文
共 50 条
  • [31] A regional information network: Management and security
    Beuscart, RJ
    Delerue, D
    Souf, A
    PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOL 20, PTS 1-6: BIOMEDICAL ENGINEERING TOWARDS THE YEAR 2000 AND BEYOND, 1998, 20 : 1174 - 1176
  • [32] MASTER as a Security Management Tool for Policy Compliance
    Crispo, Bruno
    Gheorghe, Gabriela
    Di Giacomo, Valentina
    Presenza, Domenico
    TOWARDS A SERVICE-BASED INTERNET, 2010, 6481 : 213 - +
  • [33] 'CTRL_S' - A security tool for SESAR's design-in security approach
    Gotz, Karol
    Hawley, Martin
    Hird, John
    Machin, Chris
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 499 - 502
  • [34] Management of Security and Security for Management Systems
    Westphall, Carlos Becker
    Mueller, Peter
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (03) : 241 - 243
  • [35] Management of Security and Security for Management Systems
    Carlos Becker Westphall
    Peter Mueller
    Journal of Network and Systems Management, 2010, 18 : 241 - 243
  • [36] On the maintenance management and network security of Local Area Network
    Wang Qiaoling
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 842 - 846
  • [37] Service Network Security Management (SNSM) Framework, A solution to SOSE Security Challenge
    Ahmed, Musa Midila
    Letchmunan, Sukumar
    Baharudin, Ahmad Suhaimi
    2016 6TH IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE), 2016, : 228 - 233
  • [38] The Design of Data Security Synchronization in the Network of Satellite and Ground Security Management Instrument
    Li Qianmu
    Wang Rui
    Yin Jie
    Hou Jun
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 208 - +
  • [39] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [40] Building security-aware applications on Celestial network security management infrastructure
    Xu, C
    Gong, FM
    Baldin, I
    Han, L
    Qin, XZ
    IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 219 - 225