Keyword : security policy


Abnormal Policy Detection and Correction Using Overlapping Transition
Sunghyun KIM Heejo LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1053-1061
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
firewallsecurity policypolicy anomaliesnetwork securityACL
 Summary | Full Text:PDF(269.9KB)

Access Control Management for SCADA Systems
Seng-Phil HONG Gail-Joon AHN Wenjuan XU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/10/01
Vol. E91-D  No. 10 ; pp. 2449-2457
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
access controlsecurity policysupervisory control and data acquisition (SCADA)
 Summary | Full Text:PDF(1MB)

A Method to Develop Feasible Requirements for Java Mobile Code Application
Haruhiko KAIYA Kouta SASAKI Kenji KAIJIRI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/04/01
Vol. E87-D  No. 4 ; pp. 811-821
Type of Manuscript:  Special Section PAPER (Special Section on Knowledge-Based Software Engineering)
Category: Requirement Engineering
Keyword: 
goal oriented requirements analysisanti-requirementssecurity policyaccess controlJava mobile codes
 Summary | Full Text:PDF(826.9KB)

An Access Control Mechanism for Object-Oriented Database Systems
Tadashi ARAKI Tetsuya CHIKARAISHI Thomas HARDJONO Tadashi OHTA Nobuyoshi TERASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 112-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityobject-oriented database systemmultilevel access controlsecurity policytrusted computing base
 Summary | Full Text:PDF(874.5KB)