메뉴 건너뛰기




Volumn 2776, Issue , 2003, Pages 135-146

Rule-based systems security model

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 35248856852     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45215-7_11     Document Type: Article
Times cited : (4)

References (7)
  • 1
    • 35248897808 scopus 로고    scopus 로고
    • Arens, Y., Rosenbloom, P. (Eds). Report of the Workshop, New York, N, Y., Feb. 27 - Mar. 1
    • Arens, Y., Rosenbloom, P. (Eds). Responding to the unexpected. Report of the Workshop, New York, N, Y., Feb. 27 - Mar. 1, 2002, URL http://crue.isi.edu/research/report.html
    • (2002) Responding to the Unexpected
  • 5
    • 73149088036 scopus 로고    scopus 로고
    • Distributed Management Task Force, Inc.
    • The CIM Tutorial, Distributed Management Task Force, Inc. ,2003, URL http:// www.dmtf.org/education/cimtutorial/index.php
    • (2003) The CIM Tutorial
  • 6
    • 84955584547 scopus 로고    scopus 로고
    • Security Considerations and Models for Service Creation in Premium IP Networks
    • Smirnov, M.: Security Considerations and Models for Service Creation in Premium IP Networks, LNCS 2052, pp.51-63
    • LNCS , vol.2052 , pp. 51-63
    • Smirnov, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.