共 50 条
- [41] Policy specification and enforcement for detection of security violations in a mail service [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 172 - +
- [43] Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting [J]. NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2021, 337 : 85 - 98
- [44] Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [45] A Declarative Approach for Easy Specification and Automated Enforcement of Security Policy [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 60 - 71
- [46] Efficient security policy enforcement in a location based service environment [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 61 - +
- [47] A METHOD FOR SOFTWARE IMPLEMENTATION OF COMPUTER SECURITY POLICY ENFORCEMENT MECHANISMS [J]. AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, : 1063 - 1069
- [49] A Simple Security Policy Enforcement System for an Institution Using SDN Controller [J]. PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 489 - 494
- [50] Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 105 - 118