共 50 条
- [31] Automatic management of network security policy DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 12 - 26
- [33] Security Policy Compliance with Violation Management FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 31 - 40
- [34] Security checker architecture for policy-based security management COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
- [36] Validation of a Security Policy by the Test of its Formal B Specification - a Case Study 2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, : 6 - 12
- [37] How to leverage access control specification for autonomic policy management ICAC 2005: Second International Conference on Autonomic Computing, Proceedings, 2005, : 358 - 359
- [38] Security Requirements Specification in Service-oriented Business Process Management 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 41 - 48
- [39] Specification for security Orchestration INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 429 - 441
- [40] Security specification and verification 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434