Citation: | Xia Chunhe, Wei Yudi, Li Xiaojian, et al. Computer network defense policy model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(8): 925-929. (in Chinese) |
[1] Sloman M S. Policy driven management for distributed systems[J]. Journal of Network and Systems Management,1994, 2(4):333-360 [2] Stern D F. On the buzzword "security policy" Security and Privacy. Los Alamitors:IEEE CS Press, 1991: 219-230 [3] 夏春和. 基于入侵诱骗的防御体系及关键技术研究 . 北京:北京航空航天大学计算机学院, 2003 Xia Chunhe. Research on intrusion-deception-based network defense architecture and key technology . Beijing: School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics,2003(in Chinese) [4] Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security Grid and Cooperative Computing. Berlin:Springer, 2004, 3252:437-439 [5] Moffett J D, Sloman M S. Policy hierarchies for distributed systems management[J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414 [6] Wies R. Using a classification of management policies for policy specification and policy transformation Integrated Network Management.London:Chapman Hill, 1995:44-56 [7] Katri Ylitalo. Policy core information model . 2000. http://www.cs.helsinki.fi/u/kraatika/Courses/QoS00a/ylitalo.pdf [8] Kim S Y, Kim M E, Kim K, et al. Information model for policy-based network security management Wired Communications and Management. Berlin:Springer, 2002, 2343: 662-672 [9] Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism Information Security and Cryptology. Berlin:Springer, 2006,4318: 168-181 [10] Bartal Y, Mayer A J, Nissim K, et al. Firmato: a novel firewall management toolkit[J]. ACM Transactions on Computer Systems, 2004, 22(4):381-420 [11] Luck I, Schafer C, Krumm H. Model-based tool assistance for packet-filter design Policies for Distributed Systems and Networks. Berlin:Springer, 2001: 120-136 [12] Kalam A Abou El, Baida R El, Balbiani P, et al. Organization based access control Policies for Distributed Systems and Networks (POLICY'03).Lake Como:IEEE CS Press, 2003 :120-131 [13] Cuppens F, Cuppens-Boulahia N, Sans T, et al. A formal approach to specify and deploy a network security policy[J]. Second Workshop on Formal Aspects in Security and Trust, 2004 [14] Debar H, Thomas Y, Boulahia-Cuppens N, et al. Using contextual security policies for threat response Detection of Intrusions and Malware & Vulnerability Assessment. Berlin:Springer, 2006,4064:109-128 [15] 许国志. 系统科学[M]. 上海:上海科技教育出版社, 2000 Xu Guozhi. System science[M]. Shanghai: Shanghai Scientific and Technological Education Publishing House,2000(in Chinese) [16] Nstissc.National information systems security (infosec) glossary[S]. Nstissi No 4009: Nstissc,2000 [17] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer,1996, 29(2):38-47
|