Results 1 - 10
of
3,508
Table :Security-
Cited by 1
Table 3: Security services - Security mechanisms relationship
1999
"... In PAGE 6: ... The security solution proposed in this paper is based on secure Web communication and TTP services. The available security concepts and technologies are presented in Table3 . Among them, the mechanisms proposed and utilised by our approach are denoted in italics.... ..."
Cited by 1
Table 2: Security objectives and security services mapping
2001
Cited by 7
Table 1. Mapping security policies to security attributes
TABLE II SECURITY MEASURES Threat Security Measures
TABLE II SECURITY MEASURES Threat Security Measures
Table 2: Security objectives
1999
"... In PAGE 11: ... To select a precise attacker we choose the insider set of privileges defined in Section 2. Table2 summarizes these case studies. For the analysis of the second security objective, one problem appears due to the existence of superusers in Unix.... ..."
Cited by 57
Results 1 - 10
of
3,508