共 12 条
- [1] Basile C., Lioy A., Prez G.M., Clemente F.J.G., Skarmeta A.F.G., POSITIF: A policy-based security management system, 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007, (2007)
- [2] Lapiotis G., Kim B., Das S., Anjum F., A Policy-based Approach to Wireless LAN Security Management, International Workshop on Security and Privacy for Emerging Areas in Communication, 2005, pp. 181-189, (2005)
- [3] Burns J., Cheng A., Gurung P., Rajagopalan S., Rao P., Rosenbluth D., Martin D., Automatic mnagement of network security policy, Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), 2001, pp. 12-26, (2001)
- [4] Yavatkar R., Pendarakis D., Guerin R., RFC 2753: A Framework for Policy-based Admission Control, Internet Society, pp. 1-20, (2000)
- [5] Westrinen A., Schnizlein J., Strassner J., Scherling M., Quinn B., Herzog S., Carlson M., Perry J., Wldbusser S., RFC 3198: Terminology for policy-based management, Internet Society, pp. 1-21, (2001)
- [6] Chandha R., Lapiotis G., Wright S., Special issue on policy-based networking, IEEE Network Magazine, 16, 2, pp. 8-56, (2002)
- [7] Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., Chandramouli R., Proposed NIST standard for role-based access control, ACM Trnsactions on Information and Systems Security, 4, 3, (2001)
- [8] Joshi J.B.D., Bertino E., Latif U., Ghafoor A., A generalized temporal role- based access control model, IEEE Transactions on Knowledge and Data Engineering, 17, 1, pp. 4-23, (2005)
- [9] Bertino E., Catania B., Damiani M.L., Perlasca P., GEO-RBAC: A spatially aware RBAC, SACMAT 2005: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 29-37, (2005)
- [10] Ray I., Toahchoodee M., A spatio-temporal role-based access control model, LNCS, 4602, pp. 211-226, (2007)