1 |
K. Verlaenen, B. De Win, W. Joosen, Towards simplified specification of policies in different domains, IEEE, 2007
DOI
|
2 |
S. Jajodia et al., A Logical Language for Expressing Authorizations, Proceedings of the IEEE Symposium on Security and Privacy 1997, pp.31-42
DOI
|
3 |
E. Lupu and M. Sloman, Conflicts in Policy-based Distributed Systems Management, Proceedings of the 5th IEEE/IFIP International Symposium on Integrated Network Management, IEEE, 1999
DOI
ScienceOn
|
4 |
Common Information Model CIM : http://www.dmtf.org/standards/standard_cim.php
|
5 |
IETF Policy Core Information Model (PCIM): http://www.ietf.org/rfc/rfc3060.txt
|
6 |
The Parlay Group, Comparing OMA OSE and Parlay Architectures, March, 2005
|
7 |
Open Mobile Alliance PEEM : http://www.openmobile.com
|
8 |
Stone, B. LUNDY, et al. 2001. Network Policy Languages: A Survey and a New Approach. IEEE Network: 10-20
DOI
ScienceOn
|
9 |
J. LOBO, R. BHATIA, et al. 1999. A Policy Description Language. AAAI, Orlando, Florida
|
10 |
J. Hoagland et al., Security Policy Specification Using a Graphical Approach, Technical report CSE-98-3, University of California, Davis Department of Computer Science, 1998
|
11 |
N. Damianou, N. Dulay, E. Lupu, M. Sloman, Tools for Domain-based Policy Management of Distributed Systems, IEEE, 2002
DOI
|
12 |
A. Pilz, Policy-Maker a Toolkit for Policy-Based Security Management, INST-CNR, 2007
DOI
|
13 |
E. Gagon, SableCC: An Object-Oriented Compiler Framework, School of Computer Science, McGill University. Montreal, Canada, March, 1998
DOI
|
14 |
jEdit Programmer's Text Editor: http://www.jedit.org
|
15 |
G. Russello, C. Dong, N. Dulay, Authorization and Conflict Resolution for Hierarchical Domains, Proceedings of the 8th International Workshop on Policies for Distributed Systems and Networks (POLICY'07), IEEE, 2007
DOI
|