共 50 条
- [2] Analysis of policy anomalies on distributed network security setups [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 496 - 511
- [3] MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 121 - 132
- [4] SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 542 - 555
- [5] Reliable process for security policy deployment [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 5 - +
- [7] Distributed Security Policy Conformance [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222
- [9] Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 41 - +
- [10] Security policy for deducting unauthorized IP based mobile host inside the network [J]. ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 177 - +