To search, Click below search items.
All Published Papers Search Service
Title
Modeling Security Policies with Recommendations
Author
Nada Essaouini, Anas Abou El Kalam, Abdellah Ait Ouahman
Vol. 11 No. 11 pp. 129-138
Keywords
Information systems security, security policies, access control models, Deontic logic
Early packet rejection based on combining multiple fields using XOR operator with balanced tree
Vu Duy Nhat, Nguyen Manh Hung,
Vol. 15 No. 10 pp. 22-29
firewall packet classification early packet rejection security policies in firewall.
Management Policies for the Prevention Technique of Social Engineering (SoE) Attacks in the Organization
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed and Tan Tse Guan
Vol. 19 No. 10 pp. 78-82
SoE information security policies risk management security policies .