[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xue et al., 2007 - Google Patents

Conflict-detection of security rules in smaller granularity content protection.

Xue et al., 2007

Document ID
16780158039031946381
Author
Xue M
Wang L
Gu J
Publication year
Publication venue
Jisuanji Gongcheng/ Computer Engineering

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements

Similar Documents

Publication Publication Date Title
IL197583A0 (en) Computer system for rule-based clothing matching and filtering considering fit rules and fashion rules
TW200745901A (en) I/O-based enforcement of multi-level computer operating modes
Xue et al. Conflict-detection of security rules in smaller granularity content protection.
ATE477990T1 (en) FIFTH COUPLING SLIDE LOCK
FR2949888B1 (en) DEVICE FOR PROTECTION AGAINST MALICIOUS SOFTWARE AND COMPUTER INCLUDING THE DEVICE.
Wu et al. Algorithm for sparse problem in collaborative filtering
GB0919003D0 (en) Rules for shared entities of a network-attached storage device
GB0307158D0 (en) Security policy in trusted computing systems
Si et al. L-BLP security model in local area network.
Liu et al. Method for Protecting Mobile. Agents Data Against Truncation
Li et al. Role-based delegation audit model
Zhao et al. Application of RSA digital signature technology in circulation of electronic official documents
Jameela Oru Lymgikathozhilaliyude Atmakatha
Zhang et al. Design of spam-based worm defense system
Zhang et al. Forward-secure proxy multi-signature scheme.
WARITAY Design and Implementation of the Social Safety Net (Cash Transfer) Project in Sierra Leone
Wilson Hot Deals? Surf's Up!
Zhang et al. Study on standardization technology for virtual prototyping simulation
Macvittie Invasion of The Identity Snatchers
Wu et al. Analysis of the electromagnetic interference of protection device.
Wang et al. Community mining with heterogeneous relation.
Tian et al. Research of the Security Mechanism of Web Services
Li et al. Protocol analysis detection mode based on data mining
Green et al. Conceptualizing Hydrologic Resilience in Temperate Forested Catchments
Ganesan Control of Decoherence in Open Quantum Systems