Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net
暂无分享,去创建一个
[1] M.A. Prieto Portillo,et al. VQ Digital Video Transmission through Coaxial Cable using OFDM , 2005, IEEE Latin America Transactions.
[2] Yong Xiao,et al. Verifying web services composition based on hierarchical colored petri nets , 2005, IHIS '05.
[3] Johnny S. Wong,et al. A taxonomy of intrusion response systems , 2007, Int. J. Inf. Comput. Secur..
[4] Nora Cuppens-Boulahia,et al. A Service Dependency Modeling Framework for Policy-Based Response Enforcement , 2009, DIMVA.
[5] Nora Cuppens-Boulahia,et al. Service Dependencies in Information Systems Security , 2010, MMM-ACNS.
[6] Computer Network Security , 2005 .
[7] Hervé Debar,et al. The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.
[8] Haiping Xu,et al. A petri net based XML firewall security model for web services invocation , 2006, Communication, Network, and Information Security.
[9] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[10] Vijay Gehlot,et al. An introduction to systems modeling and simulation with Colored Petri Nets , 2010, Proceedings of the 2010 Winter Simulation Conference.
[11] A. Gatto,et al. ACTkit: A Framework for the Definition and Enforcement of Role, Content and Context-based Access Control Policies , 2012, IEEE Latin America Transactions.
[12] Jorge Lobo,et al. Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.
[13] Raouf Boutaba,et al. Towards Extensible Policy Enforcement Points , 2001, POLICY.
[14] Sushil Jajodia,et al. Scalable Analysis of Attack Scenarios , 2011, ESORICS.
[15] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[16] Vladimir Mulukha,et al. Dynamic Firewall Configuration: Security System Architecture and Algebra of the Filtering Rules , 2011 .
[17] Hervé Debar,et al. Individual Countermeasure Selection Based on the Return On Response Investment Index , 2012, MMM-ACNS.
[18] Johnny S. Wong,et al. Intrusion response cost assessment methodology , 2009, ASIACCS '09.
[19] Shigong Long. Analysis of Concurrent Security Protocols Using Colored Petri Nets , 2009, 2009 International Conference on Networking and Digital Society.
[20] C. A. Petri. Communication with automata , 1966 .
[21] Xiao-wei Chen,et al. IPSec Modeling Based on Color Petri Nets , 2006, 2006 International Conference on Communications, Circuits and Systems.
[22] Hervé Debar,et al. HADEGA: A novel MPLS-based mitigation solution to handle network attacks , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).
[23] Lars Michael Kristensen,et al. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.
[24] Nora Cuppens-Boulahia,et al. Cost Evaluation for Intrusion Response Using Dependency Graphs , 2009, 2009 International Conference on Network and Service Security.
[25] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[26] Gustavo Gonzalez Granadillo,et al. Botnets: Lifecycle and Taxonomy , 2011, 2011 Conference on Network and Information Systems Security.
[27] Ruoyu Wu,et al. An Attack Modeling Based on Hierarchical Colored Petri Nets , 2008, 2008 International Conference on Computer and Electrical Engineering.
[28] Michael Westergaard,et al. CPN Tools for Editing, Simulating, and Analysing Coloured Petri Nets , 2003, ICATPN.
[29] Charles Lakos,et al. From Coloured Petri Nets to Object Petri Nets , 1995, Application and Theory of Petri Nets.
[30] Yang Xu,et al. Modeling and Analysis of Security Protocols Using Colored Petri Nets , 2011, J. Comput..
[31] Wil M. P. van der Aalst,et al. Applications and Theory of Petri Nets 2003 , 2003, Lecture Notes in Computer Science.
[32] V. Zaborovsky,et al. Access Control Model and Algebra of Firewall Rules , 2011 .
[33] Vijay Atluri,et al. Computer Security – ESORICS 2011 , 2011, Lecture Notes in Computer Science.
[34] C. K. M. Lee,et al. Application of hierarchical Colored Petri Net in Distributed Manufacturing network , 2010, 2010 IEEE International Conference on Industrial Engineering and Engineering Management.