Invited Sessions-Information Engineering and Applications in Ubiquotous Computing Environments-General Drawing of the Integrated Framework for Security Governance

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1234-1241 (2006)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

On cognitive informatics. [REVIEW]Yingxu Wang - 2003 - Brain and Mind 4 (2):151-167.
The Just War Theory and the Ethical Governance of Research.Ineke Malsch - 2013 - Science and Engineering Ethics 19 (2):461-486.
Global Health Justice and Governance.Jennifer Prah Ruger - 2012 - American Journal of Bioethics 12 (12):35-54.
A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.
Computing applications for the engineering design of nuclear fuel cycle facilities.P. C. Cuchieratto, A. Braganga Jr, L. Salgado & R. Bretzel - 1991 - Ai 1991 Frontiers in Innovative Computing for the Nuclear Industry Topical Meeting, Jackson Lake, Wy, Sept. 15-18, 1991 1.

Analytics

Added to PP
2014-01-28

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references