Enforceable security policies
Saved in:
| Published in: | Foundations of intrusion tolerant systems pp. 117 - 137 |
|---|---|
| Main Author: | |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
2003
|
| Subjects: | |
| ISBN: | 9780769520575, 076952057X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Author | Schneider, F.B. |
|---|---|
| Author_xml | – sequence: 1 givenname: F.B. surname: Schneider fullname: Schneider, F.B. organization: Cornell University |
| BookMark | eNotj81Kw0AURi9oQW3zACJCXyDxZv7vUkpbCwUXZl9mxjswEpOSqYu-vRV7Nmdx4IPvAW6HcWCAxxabtkV62ey6j0YgyqYVRpHEG6jIOrSGtEBt9R1UpXzhBUl__R6e10Map8g-9LwsHH-mfDovj2OfY-aygFnyfeHq6jl0m3W3eqv379vd6nVfZ8JTrSJhlNI7JZJjJLTROdZBX_TJwRnyBpMy0SsfnRVSJ0alQvCsY6Ig5_D0P5uZ-XCc8refzofrB_kLSTw9qg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/FITS.2003.1264930 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Government Computer Science |
| EndPage | 137 |
| ExternalDocumentID | 1264930 |
| GroupedDBID | 6IE 6IK 6IL AAJGR AAVQY AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i90t-4c90c33a842f8e0907c88e5b5c88deb869a60f46ca4ac87235fe044bbae5cf9b3 |
| IEDL.DBID | RIE |
| ISBN | 9780769520575 076952057X |
| IngestDate | Tue Aug 26 17:37:12 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-4c90c33a842f8e0907c88e5b5c88deb869a60f46ca4ac87235fe044bbae5cf9b3 |
| PageCount | 21 |
| ParticipantIDs | ieee_primary_1264930 |
| PublicationCentury | 2000 |
| PublicationDate | 20030000 |
| PublicationDateYYYYMMDD | 2003-01-01 |
| PublicationDate_xml | – year: 2003 text: 20030000 |
| PublicationDecade | 2000 |
| PublicationTitle | Foundations of intrusion tolerant systems |
| PublicationTitleAbbrev | FITS |
| PublicationYear | 2003 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000394930 |
| Score | 1.3341558 |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 117 |
| SubjectTerms | Automata Computer security Engineering management Government Information security Monitoring Operating systems Protection Resource management Software engineering |
| Title | Enforceable security policies |
| URI | https://ieeexplore.ieee.org/document/1264930 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEJ4g8cAJBYyimD14tFC23W17NhC9EBL3wI203WnCBQwPf79td1li4sVTn2n6SDOdmX7zAbzkmqL0TwEiSoeEo0YitZOkRC15Sh3XqYtkE2KxkKuVWrbgtcHCIGL8fIbjkI2-_HJnT8FUNpl66a2YV9CvhMgrrFZjT6FMhbZKM1dZ6t8h5wA753JWezWnVE3mH8VnjAY6rgf9xa4Shcu8-79p3cDggtJLlo38uYUWbnvQPdM0JPWt7UHnwqfbh9Es4I8sBsRUcqjJ65JA1eC7HwZQzGfF2zupKRLIRtEj4VZRy1jYVieRekXXSomZyXxSopG50rnf79xqrq0UKcscUs6N0ZhZpwy7g_Z2t8V7SEIQmFJIqxgqLnSqjTBMp17xlir3Yz1AP6x8_VUFwVjXix7-Xf0InfjrLdoqnqB93J9wBNf2-7g57J_jyf0AF86WIg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEB7EFurJVi192e6hx0bjJrubnIui1IrQPXiTbHYCXrT4-v1NYlQKvfSUJyEPwmRm8s0H8JoqisI-BUhWGiQcFRKhjCAlKsFjariKjSebyCYTMZvJaQXeTlgYRPSfz7Djst6XX670zpnKuj0rvSWzCvqFY84KaK2TRYUy6VoPurlMYvsSOYbYOZaT4NfsUdkdjPIvHw-0E4b9xa_ixcug_r-JXUPrjNOLpicJdAMVXDagfiRqiMK9bUDtzKjbhHbfIZA0OsxUtAn0dZEja7DdNy3IB_38fUgCSQJZSLolXEuqGXMbawRSq-pqITApEpuUWIhUqtTueKoVV1pkMUsMUs6LQmGijSzYLVSXqyXeQeTCwJSZ0JKh5JmKVZEVTMVW9RYytWPdQ9OtfP59CIMxD4t--Lv6Ba6G-ed4Ph5NPh6h5v_AecvFE1S36x224VLvt4vN-tmf4g8iCZlr |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Foundations+of+intrusion+tolerant+systems&rft.atitle=Enforceable+security+policies&rft.au=Schneider%2C+F.B.&rft.date=2003-01-01&rft.pub=IEEE&rft.isbn=9780769520575&rft.spage=117&rft.epage=137&rft_id=info:doi/10.1109%2FFITS.2003.1264930&rft.externalDocID=1264930 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769520575/sc.gif&client=summon&freeimage=true |

