Xue et al., 2007 - Google Patents
Conflict-detection of security rules in smaller granularity content protection.Xue et al., 2007
- Document ID
- 16780158039031946381
- Author
- Xue M
- Wang L
- Gu J
- Publication year
- Publication venue
- Jisuanji Gongcheng/ Computer Engineering
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL197583A0 (en) | Computer system for rule-based clothing matching and filtering considering fit rules and fashion rules | |
TW200745901A (en) | I/O-based enforcement of multi-level computer operating modes | |
Xue et al. | Conflict-detection of security rules in smaller granularity content protection. | |
ATE477990T1 (en) | FIFTH COUPLING SLIDE LOCK | |
FR2949888B1 (en) | DEVICE FOR PROTECTION AGAINST MALICIOUS SOFTWARE AND COMPUTER INCLUDING THE DEVICE. | |
Wu et al. | Algorithm for sparse problem in collaborative filtering | |
GB0919003D0 (en) | Rules for shared entities of a network-attached storage device | |
GB0307158D0 (en) | Security policy in trusted computing systems | |
Si et al. | L-BLP security model in local area network. | |
Liu et al. | Method for Protecting Mobile. Agents Data Against Truncation | |
Li et al. | Role-based delegation audit model | |
Zhao et al. | Application of RSA digital signature technology in circulation of electronic official documents | |
Jameela | Oru Lymgikathozhilaliyude Atmakatha | |
Zhang et al. | Design of spam-based worm defense system | |
Zhang et al. | Forward-secure proxy multi-signature scheme. | |
WARITAY | Design and Implementation of the Social Safety Net (Cash Transfer) Project in Sierra Leone | |
Wilson | Hot Deals? Surf's Up! | |
Zhang et al. | Study on standardization technology for virtual prototyping simulation | |
Macvittie | Invasion of The Identity Snatchers | |
Wu et al. | Analysis of the electromagnetic interference of protection device. | |
Wang et al. | Community mining with heterogeneous relation. | |
Tian et al. | Research of the Security Mechanism of Web Services | |
Li et al. | Protocol analysis detection mode based on data mining | |
Green et al. | Conceptualizing Hydrologic Resilience in Temperate Forested Catchments | |
Ganesan | Control of Decoherence in Open Quantum Systems |