Analysis of a Two Category Confidentiality Modeling Information Security
Analysis of a Two Category Confidentiality Modeling Information Security
出处
《通讯和计算机(中英文版)》
2012年第5期538-546,共9页
Journal of Communication and Computer
参考文献22
-
1A. Smith, .Supply chain management using electronic reverse auctions: A multi-firm case study, International Journal of Services and Standards 2 (2006) 176-189.
-
2K. Hsu, Z. Zhu, SAS 99-Consideration of fraud in a financial statement audit: A new auditing standard, International Journal of Services and Standards 1 (2005) 414-425.
-
3G. McDaniel, IBM Dictionary of Computing, New York, NY: McGraw-Hill, Inc., 1994.
-
4M. Lee, T. Chang, Applying ISO 17799:2005 in information security management, International Journal of Services and Standards 3 (2007) 352-373.
-
5K. Chen, M. Shing, C. Shing, H. Lee, Modeling in confidentiality and integrity for a supply chain network, Communications of the lIMA, 2007.
-
6K Chen, H. Lee, J. Yang, Security considerations on the design of supply chain networks, the Proceedings of Southwest Decision Sciences Institute, 2006.
-
7D. Clark, D. Wilson, A comparison of commercial and military security policies, in: Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987, pp. 184-194.
-
8M. Shing, C. Shing, K. Chen, H. Lee, Security modeling on the supply chain networks, in: Proceedings of EIST 2006, Orlando, FL, 2006.
-
9M. Shing, C. Shing, K. Chen, H. Lee, Security modeling on the supply chain networks, Journal of Systemic, Cybernetics and Informatics 5 (2008) 53-58.
-
10M. Shing, C. Shing, K. Chen, H. Lee, A simulation study of confidentiality modeling in a secured supply chain network, in: Proceedings of International Symposium on Intelligent, Information Technology Application Conference, 2008, Shanghai, China.
-
1通信处理器用硬件方式实现分类与流量管理[J].电子设计技术 EDN CHINA,2007,14(8):40-40.
-
2通广——北电有限公司新业务部成立[J].计算机网络世界,2000,10(3):10-10.
-
3李武刚.网络安全技术及策略在校园中的应用研究[J].计算机光盘软件与应用,2014,17(19):177-178. 被引量:2
-
4微软等四大网络供应商成立反垃圾邮件联盟[J].互联网天地,2004(3):78-78.
-
5城市热点携新品亮相CERNET年会[J].广播电视信息,2010(2):105-105.
-
6如此用心[J].百姓生活(下半月),2012(3):77-77.
-
7王国梁.存储在云端就像在身边[J].新知客,2010,0(11):93-93.
-
8姜建华,赵长林.在数据中心实施物理安全措施[J].网络运维与管理,2014(17):28-28.
-
9薛淑敏.英国出台政策促进互联网安全[J].世界教育信息,2012,25(4):76-76.
-
10三木,本刊资料图.合作伙伴要看你做过什么,而不是做什么——本刊专访上海畅星信息科技有限公司董事长陈刚[J].音响改装技术,2014(3):70-70.