共 50 条
- [2] Modeling context-based security policies with contextual graphs SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 28 - 32
- [4] Using contextual security policies for threat response DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 109 - 128
- [5] Modeling Security Policies with Recommendations INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (11): : 129 - 138
- [6] Architecture-Aware Adaptive Deployment of Contextual Security Policies FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 87 - 95
- [7] Modeling and Verification of ATM Security Policies with SecBPMN 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 588 - 591
- [9] From State-based to Event-based Contextual Security Policies 2009 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, 2009, : 220 - 226
- [10] FSM Modeling of Testing Security Policies for MapReduce Frameworks 2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019, : 1480 - 1485