Amanote Research

Amanote Research

    RegisterSign In

Specification and Deployment of Integrated Security Policies for Outsourced Data

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-662-43936-4_2
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2014

Authors
Anis BkakriaFrédéric CuppensNora Cuppens-BoulahiaDavid Gross-Amblard
Publisher

Springer Berlin Heidelberg


Related search

Security Threat Classification for Outsourced IT Projects

2017English

Security of Data Science and Data Science for Security

2019English

Dynamic Access Control Policies: Specification and Verification

Computer Journal
Computer Science
2012English

Security Policies and Procedures

2009English

Integrated Policies for Environmental Resilience and Sustainability

Proceedings of the Institution of Civil Engineers: Engineering Sustainability
CivilStructural Engineering
2009English

Swiss Policies for More Food Security

SSRN Electronic Journal
2014English

KAPUER: A Decision Support System for Privacy Policies Specification

Annals of Data Science
2014English

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Information Security Policies for Networkable Devices

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy