共 50 条
- [1] Formal Verification of Security Policy Implementations in Enterprise Networks [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
- [2] Automatic security policy enforcement in computer systems [J]. COMPUTERS & SECURITY, 2018, 73 : 156 - 171
- [3] Enforcement of integrated security policy in Trusted Operating Systems [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 214 - +
- [4] Verification of Security Policy of Service Oriented Systems [J]. 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED MULTIMEDIA SYSTEMS (DMS 2010), 2010, : 120 - 125
- [5] Policy-based security management for enterprise systems [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
- [6] Security Policy Verification Tool for Geographical Information Systems [J]. INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2007, : 128 - 146
- [7] Security policy verification for multi-domains in cloud systems [J]. International Journal of Information Security, 2014, 13 : 97 - 111
- [9] A flexible architecture for security policy enforcement [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
- [10] Patterns in security enforcement policy development [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 744 - 748