Security service adaptation for embedded service systems in changing environments
暂无分享,去创建一个
[1] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[2] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[3] Srinivas Devadas,et al. Proxy-based security protocols in networked mobile devices , 2002, SAC '02.
[4] Ingo Lück,et al. Model-based configuration of VPNs , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[5] Morris Sloman,et al. Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..
[6] Morris Sloman,et al. Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.
[7] Heiko Krumm,et al. Model-Based Tool-Assistance for Packet-Filter Design , 2001, POLICY.
[8] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[9] Richard Baskerville. Designing information systems security , 1988 .