×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [example policies]
Racing the Statehouse: Advancing Equitable Policies 2010
115 views
Minimizing bullying and harassment June 2014
248 views
Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection Min Xu George Mason University Xuxian Jiang George Mason University Ravi
219 views
Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität
238 views
Lecture 11 managing the network
175 views
Reducing bills newsletter summer 2013 (a4 single page)
208 views
NHS Improvement Programme by raona
192 views
Lucian Popa Minlan Yu Steven Y. Ko UC Berkeley/ICSI Princeton Univ. Princeton Univ. Sylvia Ratnasamy Ion Stoica Intel Labs Berkeley UC Berkeley CloudPolice:
218 views
Page 1 /HP-Labs Bristol Mar. 2003 © E. Lupu, M. Sloman, 2003 Policy Based Network Management ControlactionsDecisions Managed Objects Monitor Events Manager
214 views
WS-PolicyNegotiate A Web Service Standard for Policy Negotiation by Nicholis Bufmack
222 views
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18
219 views
Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection
23 views
Next >