Information Technology Reference
In-Depth Information
5. Kumari, P., Pretschner, A.: Deriving implementation-level policies for usage control en-
forcement. In: Proceedings of the Second ACM Conference on Data and Application Secu-
rity and Privacy, pp. 83-94. ACM Press (2012), doi:10.1145/2133601.2133612
6. Basile, C., Lioy, A., Vallini, M.: Towards a Network-Independent Policy Specification. In:
2010 18th Euromicro International Conference on Parallel, Distributed and Network-
Based Processing (PDP 2010), pp. 649-653. IEEE Press (February 2010),
doi:10.1109/PDP.2010.45
7. Maity, S., Ghosh, S.K.: Enforcement of access control policy for mobile ad hoc networks.
In: Proceedings of the Fifth International Conference on Security of Information and Net-
works (SIN 2012), pp. 47-52. ACM Press (2012), doi:10.1145/2388576.2388582
8. Department of Defense. JP3-13: Information Operations. US Government printing, Wash-
ington, DC (February 2006)
9. Bandara, A.K., Lupu, E.C., Moffett, J., Russo, A.: A goal-based approach to policy re-
finement. In: Fifth IEEE International Workshop on Policies for Distributed Systems and
Networks, pp. 229-239. IEEE Press (June 2004), doi:10.1109/POLICY.2004.1309175
10. de Albuquerque, J.P., Krumm, H., de Geus, P.L., Jeruschkat, R.: Scalable model-based
configuration management of security services in complex enterprise networks. Software:
Practice and Experience 41(3), 307-338 (2011), doi:10.1002/spe.1014
11. Bryans, J.W., Fitzgerald, J.S., McCutcheon, T.: Refinement-Based Techniques in the
Analysis of Information Flow Policies for Dynamic Virtual Organisations. In: Camarinha-
Matos, L.M., Pereira-Klen, A., Afsarmanesh, H. (eds.) PRO-VE 2011. IFIP AICT,
vol. 362, pp. 314-321. Springer, Heidelberg (2011)
12. Laborde, R., Kamel, M., Barrere, F., Benzekri, A.: Implementation of a formal security
policy refinement process in WBEM architecture. Journal of Network and Systems Man-
agement 15(2), 241-266 (2007), doi:10.1007/s10922-007-9063-z
13. Stouls, N., Potet, M.-L.: Security policy enforcement through refinement process. In:
Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol. 4355, pp. 216-231. Springer,
Heidelberg (2006)
14. Hassan, A.A., Bahgat, W.M.: A Framework for Translating a High Level Security Policy
into Low Level Security Mechanisms. In: 2009 IEEE/ACS International Conference on
Computer Systems and Applications, pp. 504-511. IEEE Press (2009),
doi:10.1109/AICCSA.2009.5069371
15. Wei, Q., Lü, L.S., Wei, Z., Wu, W.K., Xia, C.H.: CNDIDL:A CND Intention Description
Language for CND Decision. In: 2012 World Congress on Information and Communica-
tion Technologies (WICT 2012), pp. 1142-1147. IEEE Press (November 2012),
doi:10.1109/WICT.2012.6409246
 
Search WWH ::




Custom Search