Movatterモバイル変換


[0]ホーム

URL:


Rogers, 1987 - Google Patents

An Overview of the Candware Program

Rogers, 1987

ViewHTML
Document ID
15092956963635467380
Author
Rogers H
Publication year
Publication venue
10th National Computer Security Conference Proceedings, September 21-24, 1987:" Computer Security... from Principles to Practices."

External Links

Snippet

1. INTRODUCTION The National Security Agency is currently involved in several programs to hasten the day when high-quality communications security can be effectively and efficiently provided for computer networking applications. A very promising development in …
Continue reading atbooks.google.com (HTML) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage
    • Y02E60/12Battery technology
    • Y02E60/122Lithium-ion batteries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications

Similar Documents

PublicationPublication DateTitle
Herrmann et al.Security requirement analysis of business processes
JP2015534138A (en) Method and system for secure authentication and information sharing and analysis
Schou et al.Information Assurance Handbook
Goodwin et al.Developing a National strategy for CyberSecurity
US20250317469A1 (en)Systems and methods for verification and validation of cyber resilience
Ambhire et al.Information security in banking and financial industry
Haber et al.Regulatory compliance
Deane et al.The Official (ISC) 2 CISSP CBK Reference
Morris et al.Cybersecurity as a Service
Fumy et al.Enterprise security: IT security solutions--concepts, practical experiences, technologies
Yamany et al.Intelligent security and access control framework for service-oriented architecture
RogersAn Overview of the Candware Program
Cazemier et al.Information Security Management with ITIL® V3
Ishaya et al.Trust development and management in virtual communities
Demchenko et al.Big Data Security and Compliance, Data Privacy Protection
Salih et al.Iot-enabled cloud storage data access control model based on blockchain technology
SavolainenEvaluating security and privacy of SaaS service
Zhang et al.Controlling information risk in E-commerce
HussainThe design and applications of a privacy-preserving identity and trust-management system
JordanCyber infrastructure protection
WairagadeRole of Identity and Access Management in Corporate Management
KokCloud computing & confidentiality
LampikariSecure Cloud Implementation in Governmental Organisations
Maria BrumaUsing Cloud Control Matrix to evaluate trust in cloud providers
Benabdallah et al.Security issues in E-government models: what governments should do?

[8]
ページ先頭

©2009-2025 Movatter.jp