共 50 条
- [1] Automata-Based Approach to Design and Analyze Security Policies [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
- [2] Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 882 - 887
- [4] Assessment of Network Security Policy Based on Security Capability [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
- [5] Network security project management: A security policy-based approach [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
- [7] Security policy of network messages based on SOAP [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (01): : 66 - 70
- [8] Design of a LDAP schema based on network security policy information model for storing security policy [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
- [9] CBSS: Cloud-Based Security System with Interface to Network Security Functions [J]. 2023 FOURTEENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK, ICMU, 2023,
- [10] SDN-based Security Services using Interface to Network Security Functions [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 526 - 529