共 50 条
- [31] Specification and verification of security policies in firewalls EURASIA-ICT 2002: INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, 2510 : 154 - 163
- [32] A Generic Model for Delegation in Security Policies 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING (COMNET 2009), 2009, : 125 - 132
- [33] Runtime Enforcement of Dynamic Security Policies SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 340 - 356
- [34] Probabilistic Cost Enforcement of Security Policies SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 144 - 159
- [35] Formal Specification and Validation of Security Policies FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 148 - +
- [36] Security Mapping to Enhance Matching Fine-Grained Security Policies NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 183 - 196
- [37] Security policies in OSI-management experiences from the DeTeBerkom project BMSec COMPUTER NETWORKS AND ISDN SYSTEMS, 1996, 28 (04): : 499 - 511
- [38] ASPIRE: An Intermediate Representation for Abstract Security Policies 2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID, 2023, : 175 - 180
- [39] The Impact of Corporate Culture in Security Policies - A Methodology PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 98 - 103