- 充值
- 会员
- 职称材料
文献信息
Computer SecurityAccess ControlInformation FlowSecurity PolicyInformation Flow SecuritySecurity RequirementsIntrusion Detection SystemsIntrusion DetectionModel CheckingRole-based Access ControlSecurity ProtocolFormal VerificationDistributed SystemsFormal AnalysisQuantitative Information FlowInformation Flow ControlAuthorization ModelType SystemTrust Managementthe Internet
vol.34 (2026)
vol.33 (2025)
vol.32 (2024)
vol.31 (2023)
vol.30 (2022)
vol.29 (2021)
vol.28 (2020)
vol.27 (2019)
vol.26 (2018)
vol.25 (2017)
vol.24 (2016)
vol.23 (2015)
vol.22 (2014)
vol.21 (2013)
vol.20 (2012)
vol.19 (2011)
vol.18 (2010)
vol.17 (2009)
vol.16 (2008)
vol.15 (2007)
vol.14 (2006)
vol.13 (2005)
Zhao, JinxiongNiu, Ji'enYang, YongLi, ZhiruLiu, DongqingZhang, Lei