Policy Translation and Reconciliation Techniques for the System-of-Systems Domain (Englisch)
- Neue Suche nach: Drew, O.
- Neue Suche nach: Shi, Q.
- Neue Suche nach: Merabti, M.
- Neue Suche nach: Drew, O.
- Neue Suche nach: Shi, Q.
- Neue Suche nach: Merabti, M.
- Neue Suche nach: Jahankhani, H.
- Neue Suche nach: Hessami, A.G.
- Neue Suche nach: Xu, F.
In:
Global security safety and sustainability; ICGS3
;
183-190
;
2009
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Policy Translation and Reconciliation Techniques for the System-of-Systems Domain
-
Beteiligte:Drew, O. ( Autor:in ) / Shi, Q. ( Autor:in ) / Merabti, M. ( Autor:in ) / Jahankhani, H. / Hessami, A.G. / Xu, F.
-
Kongress:Conference; 5th, Global security safety and sustainability; ICGS3 ; 2009 ; London, England
-
Erschienen in:COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE ; 45 ; 183-190
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:8 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!Poulter, A. / Ferguson, I. / McMenemy, D. / Glassey, R. et al. | 2009
- 9
-
A Security Audit Framework for Security Management in the EnterpriseOnwubiko, C. et al. | 2009
- 18
-
Watermarking Spatial Data in Geographic Information SystemsAybet, J. / Al-Saedy, H. / Farmer, M. et al. | 2009
- 27
-
Situation Awareness in Systems of Systems Ad-Hoc EnvironmentsArabo, A. / Shi, Q. / Merabti, M. et al. | 2009
- 35
-
The Georgia's CyberwarRios, M.J. / de Magalhaes, S.T. / Santos, L. / Jahankhani, H. et al. | 2009
- 43
-
The UK Government's Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA ArchitectureBennett, D. / Jahankhani, H. et al. | 2009
- 56
-
Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank FunctionsKirsal, Y. / Gemikonakli, O. et al. | 2009
- 64
-
Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer's Trust (A Case Study in Iranian Car Producers)Sanayei, A. / Shafeai, R. et al. | 2009
- 76
-
A Systems Framework for SustainabilityHessami, A.G. / Hsu, F. / Jahankhani, H. et al. | 2009
- 95
-
Hybrid Genetic Algorithm for Travel Time Reliability of Optimal PathMa, D. et al. | 2009
- 104
-
Geofencing in a Security Strategy ModelIjeh, A.C. / Brimicombe, A.J. / Preston, D.S. / Imafidon, C.O. et al. | 2009
- 112
-
Using Business Process Execution Language to Handle Evaluation Factors for Web Services CompositionsGeorgiadis, C.K. / Pimenidis, E. et al. | 2009
- 122
-
The Significance of Security in Transmitting Clinical DataIjeh, A.C. / Preston, D.S. / Imafidon, C.O. et al. | 2009
- 132
-
Security Concern over Earth Viewer Software Using Satellite Photo ServiceHanumanthappa, M. / Kumar, M. / Reddy, B.L. et al. | 2009
- 138
-
The People's Republic of China - The Emerging Cyberpowerde Magalhaes, S.T. / Rios, M.J. / Santos, L. / Jahankhani, H. et al. | 2009
- 145
-
Computer Anti-forensics Methods and Their Impact on Computer Forensic InvestigationPajek, P. / Pimenidis, E. et al. | 2009
- 156
-
Neural Networks for Intrusion Detection SystemsBeqiri, E. et al. | 2009
- 166
-
Exploitation of Secrets Injected in Java MidletsDistefano, A. / Grillo, A. / Lentini, A. / Me, G. / Galbani, R. et al. | 2009
- 174
-
Biometrically Based Electronic Signatures for a Public Networked EnvironmentTait, B. / von Solms, B. et al. | 2009
- 183
-
Policy Translation and Reconciliation Techniques for the System-of-Systems DomainDrew, O. / Shi, Q. / Merabti, M. et al. | 2009
- 191
-
The Kido Botnet: Back to the FutureEmm, D. et al. | 2009
- 195
-
Information Systems Security and Its Affiliation to Information Technology Risk ManagementJahankhani, H. / Nkhoma, M. et al. | 2009
- 205
-
A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving IdeaSmitha, E. et al. | 2009
- 224
-
Hey - Get Off My Cloud!Watson, D.L. et al. | 2009
- 233
-
Static and Dynamic Analysis for Web Security in Generic FormatWu, R. / Hisada, M. / Ranaweera, R. et al. | 2009