共 50 条
- [2] Validating Security Policy Conformance with WS-Security Requirements [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 133 - 148
- [3] Distributed monitoring in ad hoc networks: Conformance and security checking [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 345 - 356
- [4] XML distributed security policy for clusters [J]. COMPUTERS & SECURITY, 2004, 23 (08) : 649 - 658
- [5] Conformance of distributed systems [J]. TESTING OF COMMUNICATING SYSTEMS, PROCEEDINGS, 2003, 2644 : 163 - 179
- [6] Maintaining consistency of the security policy in distributed environment [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 179 - 186
- [7] Multilevel Policy Based Security in Distributed Database [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 572 - 580
- [8] Policy based interoperability in distributed security infrastructures [J]. CONCURRENT ENGINEERING: ENHANCED INTEROPERABLE SYSTEMS, 2003, : 1027 - 1034
- [9] Reliable Security Policy in Mobile Distributed Network [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786
- [10] Security Policy Conflict Detection for Distributed System [J]. ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 173 - +