Serveur d'exploration sur SGML - Exploration (Accueil)

Index « Titre (en) » - entrée « security »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
securities < security < sedimentary  Facettes :

List of bibliographic references indexed by security

Number of relevant bibliographic references: 12.
Ident.Authors (with country if any)Title
000060 (2012) Jian Yu [République populaire de Chine, Niger]XML Based Asynchronous Communication for Labor and Social Security Systems
000423 (2008) Helgaso Hör Ur Helgi ; Susan M C. Gibbons [Royaume-Uni]Certainty is Absurd: Meeting Information Security Requirements in Laws on Population Genetic Databases
000559 (2006) Kwang Moon Cho [Corée du Sud]XML Security Model for Secure Information Exchange in E-Commerce
000605 (2006) Gerald Eichler [Allemagne] ; Matthias O. Will [Allemagne]Profiles and Context Awareness for Mobile Users – A Middleware Approach Supporting Personal Security
000863 (2005) Sun-Moon Jo [Corée du Sud, Niger] ; Ki-Tac Kim [Corée du Sud] ; Hoon-Joon Kouh [Corée du Sud] ; Weon-Hee Yoo [Corée du Sud]Access Authorization Policy for XML Document Security
000A63 (2004) Choong Seon Hong [Corée du Sud] ; Joon Heo [Corée du Sud]A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3
001353 (2002) Hanna-Leena Melender [Finlande] ; Sirkka Lauri [Finlande]Experiences of security associated with pregnancy and childbirth: a study of pregnant women
001B12 (2000) R. Anderson [Royaume-Uni] ; J.-H. Lee [Corée du Sud]Jikzi — a new framework for security policy, trusted publishing and electronic commerce
001B74 (2000) Michel RiguidelCreating a new security for tomorrow’s communication networks and information systems
001C79 (1999) D. L. Myers ; K. S. Culp ; R. S. MillerUse of a Web-based process model to implement security and data protection as an integral component of clinical information management.
001D85 (1999) W. Geyer [Allemagne] ; R. Weis [Allemagne]The design and the security concept of a collaborative whiteboard
001E06 (1999) B. Harris [Nouvelle-Zélande] ; R. Hunt [Nouvelle-Zélande]TCP/IP security threats and attack methods

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Informatique/explor/SgmlV1/Data/Main/Exploration
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i -k "security" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i  \
                -Sk "security" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Informatique
   |area=    SgmlV1
   |flux=    Main
   |étape=   Exploration
   |type=    indexItem
   |index=    Title.i
   |clé=    security
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jul 1 14:26:08 2019. Site generation: Wed Apr 28 21:40:44 2021