-
1
-
-
77949447704
-
-
John Wiley and Sons, Bakersfield
-
Bidgoli, H. (ed.): Security - Threats, Vulnerabilities, Prevention, Detection, and Management, vol. 3. John Wiley and Sons, Bakersfield (2006)
-
(2006)
Security - Threats, Vulnerabilities, Prevention, Detection, and Management
, vol.3
-
-
Bidgoli, H.1
-
6
-
-
84976738413
-
Providing multilevel security of a system design
-
ACM, New York
-
Feiertag, R.J., Levitt, K.N., Robinson, L.: Providing multilevel security of a system design. In: Sixth Symposium on Operating System Principles, pp. 57-65. ACM, New York (1977)
-
(1977)
Sixth Symposium on Operating System Principles
, pp. 57-65
-
-
Feiertag, R.J.1
Levitt, K.N.2
Robinson, L.3
-
7
-
-
0019608720
-
Formal models for computer security
-
Landwehr, C.E.: Formal models for computer security. Comput. Surv. 13(3), 247-278 (1981)
-
(1981)
Comput. Surv.
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
8
-
-
0028755016
-
On the validity of the Bell-LaPadula model
-
Lindgreen, R., Herschberg, I.S.: On the validity of the Bell-LaPadula model. Comput. Secur. 13(4), 317-333 (1994)
-
(1994)
Comput. Secur.
, vol.13
, Issue.4
, pp. 317-333
-
-
Lindgreen, R.1
Herschberg, I.S.2
-
9
-
-
0022012611
-
A comment on the Basic Security Theorem of Bell and LaPadula
-
McLean, J.: A comment on the Basic Security Theorem of Bell and LaPadula. Inf. Process. Lett. 20(2), 67-70 (1985)
-
(1985)
Inf. Process. Lett.
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
10
-
-
57849115713
-
Buildung access control models with attribute exploration
-
Obiedkov, S., Kourie, D.G., Erloff, J.H.P.: Buildung access control models with attribute exploration. Comput. Secur. 28(1-2), 2-7 (2009)
-
(2009)
Comput. Secur.
, vol.28
, Issue.1-2
, pp. 2-7
-
-
Obiedkov, S.1
Kourie, D.G.2
Erloff, J.H.P.3
-
11
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
12
-
-
33846794857
-
Access control in collaborative commerce
-
Li, E.Y., Du, T.C., Wong, J.W.: Access control in collaborative commerce. Decis. Support Syst. 43(2), 675-685 (2007)
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 675-685
-
-
Li, E.Y.1
Du, T.C.2
Wong, J.W.3
-
13
-
-
0036927958
-
Differentally secure multicasting and its implementation methods
-
Holeman, S., Manimaron, G., Davis, J., Chakrabarti, A.: Differentally secure multicasting and its implementation methods. Computer Security 21(8), 736-749 (2002)
-
(2002)
Computer Security
, vol.21
, Issue.8
, pp. 736-749
-
-
Holeman, S.1
Manimaron, G.2
Davis, J.3
Chakrabarti, A.4
-
14
-
-
83455237265
-
High granular multi-level-security model for improved usability
-
IEEE Press, New York
-
Thorleuchter, D., Van den Poel, D.: High Granular Multi-Level-Security Model for Improved Usability. In: 2nd International Conference on System Science, Engineering Design and Manufacturing Informatization, pp. 191-194. IEEE Press, New York (2011)
-
(2011)
2nd International Conference on System Science, Engineering Design and Manufacturing Informatization
, pp. 191-194
-
-
Thorleuchter, D.1
Van Den Poel, D.2
-
15
-
-
63849136022
-
Vertrauliche verarbeitung staatlich eingestufter information - die informationstechnologie im geheimschutz
-
Gericke, W., Thorleuchter, D., Weck, G., Reilaender, F., Loss, D.: Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz. Informatik Spektrum 32(2), 102-109 (2009)
-
(2009)
Informatik Spektrum
, vol.32
, Issue.2
, pp. 102-109
-
-
Gericke, W.1
Thorleuchter, D.2
Weck, G.3
Reilaender, F.4
Loss, D.5
-
16
-
-
84864935139
-
Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing
-
Thorleuchter, D., Van den Poel, D., Prinzie, A.: Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing. Expert Syst. Appl. 39(3), 2597-2605 (2012)
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.3
, pp. 2597-2605
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
17
-
-
82255191223
-
Mining social behavior ideas of przewalski horses
-
Wu, Y. (ed.). LNEE. Springer, Heidelberg
-
Thorleuchter, D., Herberz, S., Van den Poel, D.: Mining Social Behavior Ideas of Przewalski Horses. In: Wu, Y. (ed.) Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 649-656. Springer, Heidelberg (2011)
-
(2011)
Advances in Computer, Communication, Control and Automation
, vol.121
, pp. 649-656
-
-
Thorleuchter, D.1
Herberz, S.2
Van Den Poel, D.3
-
20
-
-
77952121800
-
Extracting consumers needs for new products
-
IEEE Computer Society, Los Alamitos
-
Thorleuchter, D., Van den Poel, D., Prinzie, A.: Extracting Consumers Needs for New Products. In: 3rd International Conference on Knowledge Discovery and Data Mining, pp. 440-443. IEEE Computer Society, Los Alamitos (2010)
-
(2010)
3rd International Conference on Knowledge Discovery and Data Mining
, pp. 440-443
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
21
-
-
84879593170
-
Mining innovative ideas to support new product research and development
-
Locarek-Junge, H., Weihs, C. (eds.). Springer, Berlin
-
Thorleuchter, D., Van den Poel, D., Prinzie, A.: Mining Innovative Ideas to Support new Product Research and Development. In: Locarek-Junge, H., Weihs, C. (eds.) Classification as a Tool for Research, pp. 587-594. Springer, Berlin (2010)
-
(2010)
Classification As A Tool for Research
, pp. 587-594
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
22
-
-
84864323539
-
Extraction of ideas from microsystems technology
-
Jin, D., Lin, S. (eds.) Springer, Heidelberg
-
Thorleuchter, D., Van den Poel, D.: Extraction of Ideas from Microsystems Technology. In: Jin, D., Lin, S. (eds.) Advances in CSIE, Vol. 1. AISC, vol. 168, pp. 563-568. Springer, Heidelberg (2012)
-
(2012)
Advances in CSIE, Vol. 1. AISC
, vol.168
, pp. 563-568
-
-
Thorleuchter, D.1
Van Den Poel, D.2
-
23
-
-
84865274099
-
Granular deleting in multi level security models - An electronic engineering approach
-
Jin, D., Lin, S. (eds.). LNEE. Springer, Heidelberg
-
Thorleuchter, D., Weck, G., Van den Poel, D.: Granular Deleting in Multi Level Security Models - An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 609-614. Springer, Heidelberg (2012)
-
(2012)
Advances in Mechanical and Electronic Engineering
, vol.177
, pp. 609-614
-
-
Thorleuchter, D.1
Weck, G.2
Van Den Poel, D.3
-
25
-
-
84874809994
-
Using webcrawling of publicly-available websites to assess e-commerce relationships
-
IEEE Computer Society, Washington (in press)
-
Thorleuchter, D., Van den Poel, D.: Using Webcrawling of Publicly-Available Websites to Assess E-Commerce Relationships. In: Service Research and Innovation Institute (SRII 2012). IEEE Computer Society, Washington (in press, 2012)
-
(2012)
Service Research and Innovation Institute (SRII 2012)
-
-
Thorleuchter, D.1
Van Den Poel, D.2
|