Enforceable security policies
Uloženo v:
| Vydáno v: | Foundations of intrusion tolerant systems s. 117 - 137 |
|---|---|
| Hlavní autor: | |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
2003
|
| Témata: | |
| ISBN: | 9780769520575, 076952057X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Author | Schneider, F.B. |
|---|---|
| Author_xml | – sequence: 1 givenname: F.B. surname: Schneider fullname: Schneider, F.B. organization: Cornell University |
| BookMark | eNotj81Kw0AURi9oQW3zACJCXyDxZv7vUkpbCwUXZl9mxjswEpOSqYu-vRV7Nmdx4IPvAW6HcWCAxxabtkV62ey6j0YgyqYVRpHEG6jIOrSGtEBt9R1UpXzhBUl__R6e10Map8g-9LwsHH-mfDovj2OfY-aygFnyfeHq6jl0m3W3eqv379vd6nVfZ8JTrSJhlNI7JZJjJLTROdZBX_TJwRnyBpMy0SsfnRVSJ0alQvCsY6Ig5_D0P5uZ-XCc8refzofrB_kLSTw9qg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/FITS.2003.1264930 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Government Computer Science |
| EndPage | 137 |
| ExternalDocumentID | 1264930 |
| GroupedDBID | 6IE 6IK 6IL AAJGR AAVQY AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i90t-4c90c33a842f8e0907c88e5b5c88deb869a60f46ca4ac87235fe044bbae5cf9b3 |
| IEDL.DBID | RIE |
| ISBN | 9780769520575 076952057X |
| IngestDate | Tue Aug 26 17:37:12 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-4c90c33a842f8e0907c88e5b5c88deb869a60f46ca4ac87235fe044bbae5cf9b3 |
| PageCount | 21 |
| ParticipantIDs | ieee_primary_1264930 |
| PublicationCentury | 2000 |
| PublicationDate | 20030000 |
| PublicationDateYYYYMMDD | 2003-01-01 |
| PublicationDate_xml | – year: 2003 text: 20030000 |
| PublicationDecade | 2000 |
| PublicationTitle | Foundations of intrusion tolerant systems |
| PublicationTitleAbbrev | FITS |
| PublicationYear | 2003 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000394930 |
| Score | 1.3341558 |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 117 |
| SubjectTerms | Automata Computer security Engineering management Government Information security Monitoring Operating systems Protection Resource management Software engineering |
| Title | Enforceable security policies |
| URI | https://ieeexplore.ieee.org/document/1264930 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEB5s6cGTrVr6suyhx0bjJtlNzkVpLyLUgzeZZCfgRYuP_v4mcVUKvfSUJyFDCPNIvvkAXtCriivPGZImJkXumbaITGpHXjrPS6wS2UQ5mej53Ewb8HrCwhBR-nxG_VhNb_nV2u1jqGwwDNrbiOCgX5RlccBqneIpXJg4dvDMjcqDHXJMsHNsq_pVc8jNYPwx-0zZQPv1or_YVZJyGbf-t61r6J5Retn0pH9uoEGrNrSONA1ZfWvb0Dzz6XagN4r4I0cRMZVta_K6LFI1hOnbLszGo9nbO6spEtjS8B2TznAnBGqZe008OLpOa1JWhaIiqwuDBfeycCjR6TIXyhOX0lok5byx4hYuV-sV3UHmfemQDPl86GNOteDpILpCBOtb2LD4PXSi5IuvQxKMRS30w9_dj9BMv95SrOIJLnebPfXgyn3vltvNczq5H-zZlqY |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEB7EFurJVi192e6hx0bjJtlNzkVRakXoHrxJNjsBL1p8_f4mcVUKvfSUJyFDCPNIvvkAXrUVBRWWEo0SCWexJTLXmnBp0HJjaaqLQDaRTiZyNlPTCrydsDCIGD6fYcdXw1t-sTI7Hyrr9pz2Vsw56BeC85ge0FqniAplyo8efHMlYmeJHFPsHNuifNfsUdUdjLKvkA-0Uy77i18lqJdB_X8bu4bWGacXTU8a6AYquGxA_UjUEJX3tgG1M6NuE9p9j0Ay6DFT0aakr4s8WYObvmlBNuhn70NSkiSQhaJbwo2ihjEteWwlUufqGilR5MIVBeYyUTqhlidGc21kGjNhkXKe5xqFsSpnt1BdrpZ4B5G1qdGo0MY967OqOV9Ha5MwZ3-z3C1-D00v-fz7kAZjXgr98Hf3C1wNs8_xfDyafDxCLfyBC5GLJ6hu1ztsw6XZbxeb9XM4xR_6W5nt |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Foundations+of+intrusion+tolerant+systems&rft.atitle=Enforceable+security+policies&rft.au=Schneider%2C+F.B.&rft.date=2003-01-01&rft.pub=IEEE&rft.isbn=9780769520575&rft.spage=117&rft.epage=137&rft_id=info:doi/10.1109%2FFITS.2003.1264930&rft.externalDocID=1264930 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/sc.gif&client=summon&freeimage=true |

