Amanowicz et al., 2024 - Google Patents
Data-Centric SecurityAmanowicz et al., 2024
- Document ID
- 10105398000911853739
- Author
- Amanowicz M
- Szwaczyk S
- Wrona K
- Publication year
- Publication venue
- Data-Centric Security in Software Defined Networks (SDN)
External Links
Snippet
Data-Centric Security | SpringerLink Skip to main content Advertisement Springer Nature Link
Account Menu Find a journal Publish with us Track your research Search Cart 1.Home
2.Data-Centric Security in Software Defined Networks (SDN) 3.Chapter Data-Centric Security …
- 238000000034 method 0 description 50
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Force et al. | Security and privacy controls for federal information systems and organizations | |
Viega | Building security requirements with CLASP | |
Beckers et al. | Analysis of social engineering threats with attack graphs | |
Amthor et al. | Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems | |
Bertino et al. | Services for zero trust architectures-a research roadmap | |
Lalanne et al. | Information security risk management in a world of services | |
Gambo et al. | Zero Trust Architecture: A systematic literature review | |
US20220269792A1 (en) | Implementing a multi-dimensional unified security and privacy policy with summarized access graphs | |
Iqbal et al. | Corda Security Ontology: Example of Post-Trade Matching and Confirmation. | |
Vijayalakshmi et al. | Shared access control models for big data: a perspective study and analysis | |
Habiba et al. | A new approach to access control in cloud | |
Raje | Security and Microservice Architecture on AWS | |
Chou et al. | Enforcing confidentiality in a SaaS cloud environment | |
Gunawardena | Dynamic Access Control Techniques and Their Role in Preserving Data Confidentiality in Multi-Cloud Retail Solutions | |
Mack | Cyber security | |
Belhadaoui et al. | A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem. | |
Haber et al. | Privileged Access Management (PAM) | |
Amanowicz et al. | Data-Centric Security | |
Runsewe | A policy-based management framework for cloud computing security | |
Amanowicz et al. | Data-Centric Security in Software Defined Networks (SDN) | |
Metoui | Privacy-aware risk-based access control systems | |
Akram et al. | Unified model for data security-A position paper | |
Mohamed et al. | Authorization strategies and classification of access control models | |
Pölck | Small TCBs of policy-controlled operating systems | |
Akeel et al. | Exposing data leakage in data integration systems |