A security model for distributed computing
Journal of Computing Sciences in Colleges
Toward an integrative model of application-software security
Practicing software engineering in the 21st century
Improving host security with system call policies
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Journal of Management Information Systems
National information security policy and its implementation: A case study in Taiwan
Telecommunications Policy
Base line performance measurements of access controls for libraries and modules
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Features and benefits of trusted computing
2009 Information Security Curriculum Development Conference
Hi-index | 48.22 |