共 50 条
- [1] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266
- [2] Security policy enforcement through refinement process [J]. B 2007: FORMAL SPECIFICATION AND DEVELOPMENT IN B, PROCEEDINGS, 2007, 4355 : 216 - +
- [4] Formal validation of automated policy refinement in the management of network security systems [J]. International Journal of Information Security, 2010, 9 : 99 - 125
- [6] The new topicality of using Formal Models of Security Policy within the security engineering process [J]. APPLIED FORMAL METHODS - FM-TRENDS 98, 1999, 1641 : 302 - 310
- [7] A Formal Implementation of Database Security [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 90 - 92
- [8] Formal Specification, Refinement, and Implementation of Path Planning [J]. PROCEEDINGS OF THE 2016 12TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2016, : 1 - 6
- [9] Security Policy Refinement: High-Level Specification to Low-Level Implementation [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 502 - 511
- [10] Using Refinement in Formal Development of OS Security Model [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 107 - 115