Font Size: a A A
Keyword [policy management]
Result: 61 - 78 | Page: 4 of 4
61. An Ontology-based Approach To Improve Access Policy Administration Of Attribute-Based Access Control
62. Security policy analysis in a trust management environment
63. Access control policy management
64. Distributed Perimeter Firewall Policy Management Framewor
65. Policy management and interoperation through negotiation in ubiquitous computing
66. Policy management and decentralized debugging in the Asbestos operating system
67. A dynamic, distributive and heterogeneous authorization policy management framework
68. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology
69. A semantic based policy management framework for cloud computing environments
70. User centric policy management
71. Clustering and recommendation techniques for access control policy management
72. Security policy management, threat alleviation and trusted platforms for embedded computing systems
73. Policy management in secure group communication
74. Customization and composition of distributed objects: Policy management in distributed software architecture
75. Policy issues in optimal rainforest management
76. Policy Conflict Management in Distributed SDN Environment
77. Research On Some Key Technologies Of Data Leak Prevention Based On Trusted Computing Platform
78. Research On Policy Conflict Detection Based On SELinux
  <<First  <Prev  Next>  Last>>  Jump to