Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,287 papers from all fields of science
Search
Sign In
Create Free Account
Computer security policy
Known as:
Policy (disambiguation)
A computer security policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Access Control Matrix
Bell–LaPadula model
Brewer and Nash model
Chinese wall
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Evaluating the Policy
M. Peters
Regulating the Rise of China
2019
Corpus ID: 159446938
This chapter evaluates the policy, primarily doing so in terms of the interests of a governmental study. It examines the…
Expand
2017
2017
Implementation Model of Maternal and Child Health Service Policy in East Nusa Tenggara Province
Florentianus Tat
2017
Corpus ID: 39992205
The Research Aim is to design the implementation model of maternal and child health policy in East Nusa Tenggara, Indonesia. The…
Expand
2016
2016
Cybersecurity policy verification with declarative programming
R. Hewett
,
Phongphun Kijsanayothin
,
Stephanie Bak
,
Marry Galbrei
Applied intelligence (Boston)
2016
Corpus ID: 9991230
Cybersecurity is a growing concern in today’s society. Security policies have been developed to ensure that data and assets…
Expand
2012
2012
The Economization, Rationalization, and Normalization of Russian Foreign Policy
C. Wallander
2012
Corpus ID: 168626427
Russian foreign policy is increasingly driven by economic factors which rationalize and make it more like that of "normal…
Expand
2011
2011
Turning the Tables on Law and: A Jurisprudential Inquiry into Contemporary Legal Theory
S. Lavi
2011
Corpus ID: 33739658
TO FUNDAMENTAL JURISPRUDENCE . . . . . . . . . . . . . . . . . . . . . . . . 814 R II. THE FOUNDING BLOCKS OF CONTEMPORARY LEGAL…
Expand
2011
2011
Socialism in the Era of Globalization:An Idea or a Policy
LI De-shan
2011
Corpus ID: 156512730
In the last decades,the development space of the Socialism in the globalization times has become the focal point in the disputes…
Expand
2005
2005
An architecture for component evolution
A. Ryan
,
J. Newmarch
Second IEEE Consumer Communications and…
2005
Corpus ID: 16655399
In an evolving object oriented system individual components may change. A system built out of such components needs to be able to…
Expand
1992
1992
Sensitive security points in PC microcomputers: understanding for building secure solutions to intrusions
D. Guinier
SGSC
1992
Corpus ID: 44368241
The future of computer security is very dependent on the wild development of networking and microcomputing, and it is more and…
Expand
1992
1992
Corrections to "Finding Optimal (s, S) Policies is About as Simple as Evaluating a Single Policy"
Yu-Sheng Zheng
,
A. Federgruen
Operational Research
1992
Corpus ID: 207241637
Correction to Zheng, Y.-S., A. Federgruen. 1991. Finding optimal s, S policies is about as simple as evaluating a single policy…
Expand
Review
1988
Review
1988
The computer security act of 1987
G. W. Milor
Computers & security
1988
Corpus ID: 45233832
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE