共 50 条
- [1] Policy-based security management for ad hoc wireless systems [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
- [2] Security checker architecture for policy-based security management [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
- [3] User isolation and policy-based security management [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
- [4] POSITIF: a policy-based security management system [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
- [5] Policy-based management for enterprise and carrier ATN networking [J]. BEC 2004: Proceeding of the 9th Biennial Baltic Electronics Conference, 2004, : 315 - 318
- [6] Policy-based management for enterprise and carrier IP networking [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 128 - 139
- [7] Network security project management: A security policy-based approach [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
- [8] A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4986 - 4997
- [9] A policy-based approach to Wireless LAN security management [J]. 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 174 - 182
- [10] Policy transformation techniques in policy-based systems management [J]. FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 13 - 22