A Device-Centric Policy Conflict in IoT
暂无分享,去创建一个
Xiaofeng Qiu | Teng Gao | Lijuan He | Lijuan He | Xiaofeng Qiu | Teng Gao
[1] Ehab Al-Shaer,et al. Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.
[2] Emil C. Lupu,et al. A Survey of Policy Specification Approaches , 2002 .
[3] Cataldo Basile,et al. Network-Level Access Control Policy Analysis and Transformation , 2012, IEEE/ACM Transactions on Networking.
[4] Limin Jia,et al. FSR: Formal Analysis and Implementation Toolkit for Safe Interdomain Routing , 2011, IEEE/ACM Transactions on Networking.
[5] Wouter Joosen,et al. Policy Analysis Using a Hybrid Semantic Reasoning Engine , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[6] Brendan Jennings,et al. On harnessing information models and ontologies for policy conflict analysis , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[7] Paris Flegkas,et al. Policy conflict analysis for diffserv quality of service management , 2009, IEEE Transactions on Network and Service Management.
[8] Roy H. Campbell,et al. An ECA-P policy-based framework for managing ubiquitous computing environments , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[9] Alessandra Russo,et al. Using event calculus to formalise policy specification and analysis , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[10] Brendan Jennings,et al. The policy continuum-Policy authoring and conflict analysis , 2008, Comput. Commun..
[11] Sumi Helal,et al. A device-centric approach to a safer internet of things , 2011, NoME-IoT '11.
[12] Brendan Jennings,et al. Efficient Policy Conflict Analysis for Autonomic Network Management , 2008, Fifth IEEE Workshop on Engineering of Autonomic and Autonomous Systems (ease 2008).
[13] Emil C. Lupu,et al. Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..
[14] Jorge Lobo,et al. Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.
[15] James J. Buckley,et al. From RFID to the Internet of Things: Pervasive Networked Systems , 2006 .
[16] Lei Jing,et al. A SMART-GATE BASED COMPOSITION METHOD TO PROVIDE SERVICES BY SOLVING CONFLICT USING DYNAMIC USER PRIORITY AND COMPROMISE POLICY , 2011 .
[17] Antonio F. Gómez-Skarmeta,et al. Detection of semantic conflicts in ontology and rule-based information systems , 2010, Data Knowl. Eng..
[18] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[19] Zhai Haoliang. Research on Consistency of Security Policy Based on Logic and Argument , 2012 .
[20] Brendan Jennings,et al. Application domain independent policy conflict analysis using information models , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[21] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[22] Panganamala Ramana Kumar,et al. A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.
[23] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[24] Cataldo Basile,et al. Towards an algebraic approach to solve policy conflicts , 2004 .
[25] David B. Resnik,et al. Conflict of Interest in Medical Research, Education, and Practice , 2010, Environmental Health Perspectives.