Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Sicherheitsrichtlinie
Search without synonyms: keywords:(Sicherheitsrichtlinie)
Used synonyms:
- security guidelines
- security policies
- security richtlinie
- security rules
- sicherheits policies
-
Trust in Cloud Computing Challenges: A Recent Survey
Springer Verlag | 2019|Keywords: Security policies -
Trusted Implementation and Enforcement of Application Security Policies
Springer Verlag | 2023|Keywords: Security policies -
Towards a Security Reinforcement Mechanism for Social Cyber-Physical Systems
Springer Verlag | 2020|Keywords: Security policies -
The Security Policy Application Process: Action Research
Springer Verlag | 2016|Keywords: Implementation and adoption of information security policies -
The Security of Information Systems in Greek Hospitals
Springer Verlag | 2013|Keywords: security policies -
The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
Springer Verlag | 2023|Keywords: Information security policies -
The Entity Labeling Pattern for Modeling Operating Systems Access Control
Springer Verlag | 2016|Keywords: Security policies -
The Effective Utilization of Audit Logs in Information Security Management
Free accessSpringer Verlag | 1999|Keywords: Security Policies -
The Effective Implementation of Information Security in Organizations
Free accessSpringer Verlag | 2002|Keywords: Information Security Policies -
Specification of Information Flow Security Policies in Model-Based Systems Engineering
Springer Verlag | 2018|Keywords: Security policies -
Social Work and the Security Issue in the Netherlands and Belgium
National licenceSpringer Verlag | 2001|Keywords: security policies -
Smart Security: Integrated Systems for Security Policies in Urban Environments
Springer Verlag | 2014|Keywords: Urban security policies -
Semantic Exploration of Distributed AR Services
Springer Verlag | 2017|Keywords: Security policies -
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies
Springer Verlag | 2014|Keywords: Security Policies -
Security Rules versus Security Properties
Springer Verlag | 2010|Keywords: Security policies, security rules -
Security policies enforcement using finite and pushdown edit automata
Springer Verlag | 2013|Keywords: Security policies
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.