To search, Click below search items.
All Published Papers Search Service
Title
Modeling Security Policies with Recommendations
Author
Nada Essaouini, Anas Abou El Kalam, Abdellah Ait Ouahman
Vol. 11 No. 11 pp. 129-138
Keywords
Information systems security, security policies, access control models, Deontic logic
Early packet rejection based on combining multiple fields using XOR operator with balanced tree
Vu Duy Nhat, Nguyen Manh Hung,
Vol. 15 No. 10 pp. 22-29
firewall packet classification early packet rejection security policies in firewall.
Management Policies for the Prevention Technique of Social Engineering (SoE) Attacks in the Organization
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed and Tan Tse Guan
Vol. 19 No. 10 pp. 78-82
SoE information security policies risk management security policies .
AWAR: An Awareness Security Model for E-Health Systems
Israa Ahmed Zriqat and Ahmad Mousa Altamimi
Vol. 25 No. 7 pp. 69-78
Electronic health records; Access control; Security policies; encryption