1 |
L.Lewis, 'Implementing policy in enterprise networks,' IEEE Communications Magazine, Vol.34, Iss.1, pp.50-55, Jan., 1996
DOI
ScienceOn
|
2 |
D. Schnackengerg, H. Holliday, et al, 'Cooperative Intrusion Traceback and Response Architecture (CITRA),' DARPA Information Survivability Conference & Exposition II, 2001 DISCEX'01, Proceedings, Vol.1, pp.56-68, Jan., 2001
DOI
|
3 |
R. Barruffi, M. Milano, et al, 'Planning for security management,' IEEE Intelligent Systems [see also IEEE Expert], Vol.16, Iss.1, pp.74-80, Feb., 2001
DOI
|
4 |
J. Zao, L. Sanchez, et al, 'Domain based Internet security policy management,' DARPA Information Survivability Conference and Exposition, 2000. DOSCEX'00, Proceedings, Vol.1, pp.41-53, Jan., 1999
DOI
|
5 |
G. Patz, M. Condell, et al, 'Multidimensional security policy management for dynamic coalitions,' DARPA Information Survivability Conference & Exposition II, 2001, DISCEX'01. Proceedings, Vol.2, pp.41-54, Feb., 2001
DOI
|
6 |
Check Point Software Technology, Inc., Open Plaform for Security (OPSEC) Technical Note, 2000
|
7 |
Check Point Software Technology, Inc., Check Point VPN-1/Firewall-1 OPSEC API Specification, Version 4.1, Nov., 1999
|
8 |
Network Associates, Inc., Automating Security managenment white Reducing Total Cost of Ownership, 1999
|
9 |
D. S. Kim, T. M. Chung, 'Implementation of Integrated Firewall Management System by Central Policy Management,' KNOM 2000, pp.169-176, May, 2000
|
10 |
Check Point Software Technology, Inc., Secure Virtual Network Architecture, A Customer-focused White Paper, Nov., 2000
|
11 |
Network Associates, Inc., Active Security Getting Started Guide Version 5.0, 1999
|
12 |
Communications Security Establishment(CSE), Threat and Risk Assessment Working Guide, ITSG-04, Canada, Oct. 1999
|