메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 231-234

Policy management of enterprise systems: A requirements study

Author keywords

[No Author keywords available]

Indexed keywords

POLICY ENABLED APPLICATIONS; POLICY MANAGEMENT; SECURITY LOGIC;

EID: 33845395955     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2006.23     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 4
    • 84893064260 scopus 로고    scopus 로고
    • Translating privacy practices into privacy promises -how to promise what you can keep
    • G. Karjoth, M. Schunter, and E. V. Herreweghen. Translating privacy practices into privacy promises -how to promise what you can keep. In POLICY, pages 135-146, 2003.
    • (2003) POLICY , pp. 135-146
    • Karjoth, G.1    Schunter, M.2    Herreweghen, E.V.3
  • 5
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • J. O. Kephart and D. M. Chess. The vision of autonomic computing. IEEE Computer, 36(1):41-50, 2003.
    • (2003) IEEE Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 10
    • 33749053162 scopus 로고    scopus 로고
    • Philosophy and methodology for knowledge discovery in autonomic computing systems
    • J. Strassner and B. J. Menich. Philosophy and methodology for knowledge discovery in autonomic computing systems. In DEXA Workshops, pages 738-743, 2005.
    • (2005) DEXA Workshops , pp. 738-743
    • Strassner, J.1    Menich, B.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.