共 50 条
- [41] Automated detection of Internet usage policy violation ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2001, : 507 - 510
- [42] Norms, Policy and Laws: Modelling, Compliance and Violation ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2020, (325):
- [43] ROMANIA AND EUROPEAN SECURITY AND DEFENCE POLICY (ESDP)/COMMON SECURITY AND DEFENCE POLICY (CSDP) 17TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION, CONFERENCE PROCEEDINGS 1: MANAGEMENT AND MILITARY SCIENCES, 2011, : 305 - 310
- [45] Policy Dominance versus Policy Success: Homeland Security and the Limits of Presidential Policy Control PRESIDENT GEORGE W. BUSH'S INFLUENCE OVER BUREAUCRACY AND POLICY: EXTRAORDINARY TIMES, EXTRAORDINARY POWERS, 2009, : 147 - 166
- [46] From a policy of maximal security to a policy of health care quality ANNALES FRANCAISES D ANESTHESIE ET DE REANIMATION, 2004, 23 (12): : 1129 - 1130
- [47] SEMANTIC ANNOTATIONS FOR SECURITY POLICY MATCHING IN WS-POLICY SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 443 - 449
- [50] Information Policy: Does Information Policy lead to Information Security? EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6520 - 6523