Font Size: a A A
Keyword [security requirements]
Result: 1 - 20 | Page: 1 of 2
1. Research Of Security Architecture And Key Technologies For Insider Threat
2. Analysis And Research On Security Requirements And Policy Of Mobile Agent
3. Research Of I-ISSRL Relation Model Base On Enterprise Informationize Degree And Information System Security Requirements Level (ISSRL) Study
4. Security Requirements Analysis And Security Protocols Design Of Cooperative Computing For Multi-users In Grid
5. The Design And Implementation Of Remote Card Personalization System Over The Air Using Handheld Terminal
6. Requirements Documentation Based Security Contract Elicitation And Its Implementation
7. Design And Implementation Research Of Cryptographic Chip Operating System
8. An Approach Of Eliciting Security Requirements Based On Knowledge Base
9. A Resource Centric Security Requirements Elicitation And Modeling Framework
10. Maximal Profit Strategy Of Multi-agent Scheduling System Meeting User’s Security Requirements
11. Referring To The Autonomous Protocol Supporting The Security Requirements Of Class C About UHF RFID Designs The Baseband Of The Chip
12. Software Security Requirements Recommendation Based On Data
13. A Systematic Approach to Generate the Security Requirements For the Smart Home System
14. A distributed network management systems for user-controlled lightpath provisioning and its security requirements
15. A study of the federal management community's awareness, attitudes and understanding of information security requirements: Focus on FISMA best practices
16. Evaluation of cryptographic construction properties and security requirements of modern secure hashing algorithms
17. Achieving a working relationship: An historical study of news media-military relations to identify and evaluate factors affecting the conflict between national security requirements versus the news media's right to know
18. Visualizing security requirements patterns
19. Exploring Information Technology Security Requirements for Academic Institutions to Reduce Information Security Attacks, Breaches, and Threats
20. On the conjunction of network security requirements and clustering: A new framework for reliable and energy-efficient communication
  <<First  <Prev  Next>  Last>>  Jump to