共 36 条
- [1] Abrams Marshall., 1995, Information Security: An Integrated Collection of Essays, P126
- [2] [Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
- [3] Baskerville R., 2002, Logistics Information Management, V15, P337, DOI 10.1108/09576050210447019
- [4] Bidan C, 1998, LECT NOTES COMPUT SC, V1485, P51, DOI 10.1007/BFb0055855
- [5] Bonatti P., 2002, ACM Transactions on Information and Systems Security, V5, P1, DOI 10.1145/504909.504910
- [6] Analyzing consistency of security policies [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 103 - 112
- [7] Corpuz MS, 2010, WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, P337
- [8] Craven Robert., 2009, SafeConfig '09: Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, P25, DOI [10.1145/1655062.1655068, DOI 10.1145/1655062.1655068]
- [10] Merging security policies: analysis of a practical example [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 123 - 136