Multi-constraint security policies for delegated firewall administration
暂无分享,去创建一个
[1] Ehab Al-Shaer,et al. Specifications of a high-level conflict-free firewall policy language for multi-domain networks , 2007, SACMAT '07.
[2] Wayne Luk,et al. Compiling policy descriptions into reconfigurable firewall processors , 2003, 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, 2003. FCCM 2003..
[3] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[4] T. Markham,et al. Security at the network edge: a distributed firewall architecture , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[5] Avishai Wool,et al. Firmato: A novel firewall management toolkit , 2004, TOCS.
[6] Xinming Ou,et al. Network Security Management with High-level Security Policies , .
[7] Jorge Lobo,et al. Policy decomposition for collaborative access control , 2008, SACMAT '08.
[8] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[9] Mark Saaltink,et al. The Z/EVES System , 1997, ZUM.
[10] Eli Winjum,et al. A multidimensional approach to multilevel security , 2008, Inf. Manag. Comput. Secur..
[11] Jianping Wu,et al. Policy based access control framework for large networks , 2000, ICON.
[12] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[13] Prasad Rao,et al. Automatic management of network security policy , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[14] Cássio Ditzel Kropiwiec. Framework for distributed firewall administration in a multi-constraint security policies context , 2009 .
[15] Joshua D. Guttman,et al. Rigorous automated network security management , 2005, International Journal of Information Security.
[16] Geoffrey G. Xie,et al. Network policy languages: a survey and a new approach , 2001, IEEE Netw..
[17] Joshua D. Guttman,et al. Filtering postures: local enforcement for global policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[18] Atul Prakash,et al. FACE: a firewall analysis and configuration engine , 2005, The 2005 Symposium on Applications and the Internet.
[19] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[20] Heiko Krumm,et al. Policy modeling and refinement for network security systems , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[21] Ni Jun,et al. A Flexible Policy-Based Firewall Management Framework , 2008, 2008 International Conference on Cyberworlds.
[22] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[23] Nora Cuppens-Boulahia,et al. Aggregating and Deploying Network Access Control Policies , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[24] Duan Haixin,et al. Policy based access control framework for large networks , 2000, Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium.