共 50 条
- [11] An improved reference flow control model for policy-based intrusion detection COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 291 - 308
- [12] Security and resource policy-based management architecture for ALAN servers NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 91 - 102
- [13] Policy-based security management for ad hoc wireless systems MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
- [14] Simulation model design of a security system based on a policy-based framework SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2003, 79 (09): : 515 - 527
- [15] The development of policy proxy agent in policy-based network security management system WSEAS Trans. Commun., 2007, 1 (236-240):
- [16] Dynamic conflict detection in policy-based management systems SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 15 - 26
- [17] Design and implementation of a policy-based resource management architecture INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 215 - 229
- [18] Policy-based intrusion detection in web applications by monitoring Java information flows International Journal of Information and Computer Security, 2009, 3 (3-4): : 265 - 279
- [19] Security and differentiated hotspot services through policy-based management architecture SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 517 - 532
- [20] Sec-SNMP: Policy-based security management for sensor networks SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 222 - 226