A State Transition Model for Policy Specification
暂无分享,去创建一个
[1] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[2] Tien Pham,et al. Intelligence, Surveillance, and Reconnaissance fusion for coalition operations , 2008, 2008 11th International Conference on Information Fusion.
[3] Jorge Lobo,et al. Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.
[4] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[5] Dakshi Agrawal,et al. Policy-based validation of SAN configuration , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[6] Benny Rochwerger,et al. Oceano-SLA based management of a computing utility , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[7] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[8] Jorge Lobo,et al. A Policy Description Language , 1999, AAAI/IAAI.