共 50 条
- [1] Security checker architecture for policy-based security management [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
- [2] Design and implementation of a policy-based resource management architecture [J]. INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 215 - 229
- [3] Security and differentiated hotspot services through policy-based management architecture [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 517 - 532
- [4] Policy-based management for ALAN-enabled networks [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 181 - 192
- [5] A policy-based bandwidth resource provisioning architecture [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 179 - 190
- [6] Policy-Based Spectrum Management Architecture [J]. 2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
- [7] A Policy-Based Architecture for Web Services Security Processing [J]. 2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 163 - 169
- [8] User isolation and policy-based security management [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
- [9] POSITIF: a policy-based security management system [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
- [10] Policy-based security management for enterprise systems [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233