[1] |
JOHNSON M , BRADSHAW J M , JUNG H ,et al. Policy management across multiple platforms and application domains[C]// IEEE Workshop on Policies for Distributed Systems and Networks. IEEE, 2008: 199-202.
|
[2] |
HOLMES B L , . Heterogeneous systems:can they ever work together?[C]// Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications. IEEE, 1988: 169-174.
|
[3] |
DAMIANOU N , DULAY N , LUPU E,et.al . The ponder policy specification language[J]. Proc of policy, 2001,55(8): 18-38.
|
[4] |
JANICKE H , CAU A , SIEWE F ,et al. Deriving enforcement mechanisms from policies[C]// IEEE International Workshop on Policies for Distributed Systems and Networks. IEEE, 2007: 161-172.
|
[5] |
JANICKE H , CAU A , SIEWE F ,et al. A compositional event &time-based policy model[C]// IEEE International Workshop on Policies for Distributed Systems and Networks. IEEE, 2006: 173-182.
|
[6] |
SIEWE F , CAU A , ZEDAN H . A compositional framework for access control policies enforcement[C]// The 2003 ACM workshop on Formal Methods in Security Engineering. ACM, 2003: 32-42.
|
[7] |
JANICKE H , CAU A , SIEWE F ,et al. Dynamic access control policies:specification and verification[J]. The Computer Journal, 2012,56(4): 440-463.
|
[8] |
LOBO J , BHATIA R , NAQVI S . A policy description language[C]// The 16th National Conference on Artificial Intelligence and the 11th Innovative Applications of Artificial Intelligence Conference. 1999: 291-298.
|
[9] |
RIBEIRO C , ZUQUETE A , FERREIRA P ,et al. SPL:an access control language for security policies and complex constraints[C]// The Network and Distributed System Security Symposium. 2001,1.
|
[10] |
DAMIANOU N , DULAY N , LUPU E ,et al. Tools for domain-based policy management of distributed systems[C]// IEEE/IFIP Network Operations and Management Symposium. IEEE, 2002: 203-217.
|
[11] |
ABWNAWAR N , JANICKE H , SMITH R ,et al. Towards data privacy in heterogeneous cloud environments:an extension to the SANTA policy language[C]// 2017 Second International Conference on Fog and Mobile Edge Computing. IEEE, 2017: 14-19.
|
[12] |
代向东 . 安全策略管理系统中策略描述及策略翻译关键技术研究[D]. 郑州:信息工程大学, 2007.
|
|
DAI X D . Research on key technologies of policy description and policy translation in security policy management system[D]. Zhengzhou:Information Engineering University, 2007.
|
[13] |
HALE J , GALIASSO P , PAPA M ,et al. Security policy coordination for heterogeneous information systems[C]// The 15th Annual Computer Security Applications Conference. IEEE, 1999: 219-228.
|
[14] |
BEIGI M S , CALO S , VERMA D . Policy transformation techniques in policy-based systems management[C]// The 15th IEEE International Workshop on Policies for Distributed Systems and Networks. 2004: 13-22.
|
[15] |
HAN W , FANG Z , YANG L T,et.al . Collaborative policy administration[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,25(2): 498-507.
|
[16] |
WANG R , ENCK W , REEVES D ,et al. EASEAndroid:automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning[C]// 24th USENIX Security Symposium. 2015: 351-366.
|
[17] |
LEIGHTON G , BARBOSA D . Access control policy translation,verification,and minimization within heterogeneous data federations[J]. ACM Transactions on Information and System Security, 2011,14(3): 1-28.
|
[18] |
RUDOLPH M , FETH D , DOERR J,et.al . Requirements elicitation and derivation of security policy templates—an industrial case study[C]// The 24th International Requirements Engineering Conference. 2016.
|
[19] |
YANG J , JEONG J P . An automata-based security policy translation for network security functions[C]// 2018 International Conference on Information and Communication Technology Convergence. IEEE, 2018: 268-272.
|
[20] |
陈文惠 . 防火墙系统策略配置研究[D]. 合肥:中国科学技术大学, 2007.
|
|
CHEN W H . Research on policy configuration of firewall system[D]. Hefei:University of Science and Technology of China, 2007.
|
[21] |
LOBO J , MARCHI M , PROVETTI A . Firewall configuration policies for the specification and implementation of private zones[C]// 2012 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 2012: 78-85.
|
[22] |
JILLEPALLI A , DE LEON D C , STEINER S ,et al. Hermes:a high-level policy language for high-granularity enterprise-wide secure browser configuration management[C]// 2016 IEEE Symposium Series on Computational Intelligence. IEEE, 2016: 1-9.
|
[23] |
李福亮, 杨家海, 吴建平 ,等. 互联网自动配置研究[J]. 软件学报, 2014,25(1): 118-134.
|
|
LI F L , YANG J H , WU J P ,et al. Research on Internet auto configuration[J]. Journal of Software, 2014,25(1): 118-134.
|