共 48 条
[1]
Balenson D., Branstad D., Dinsmore P., Heyman M., Scace C., Cryptographic Context Negotiation Template, (1999)
[2]
Bartal Y., Mayer A.J., Nissim K., Wool A., Firmato: A novel firewall management toolkit, IEEE Symposium on Security and Privacy, pp. 17-31, (1999)
[3]
Bellovin S., Distributed firewalls, Login, pp. 39-47, (1999)
[4]
Bhatti N.T., Hiltunen M.A., Schlichting R.D., Chiu W., Coyote: A system for constructing fine-grain configurable communication services, ACM Transactions on Computer Systems, 16, 4 NOV, pp. 321-366, (1998)
[5]
Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173, (1996)
[6]
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A., The role of trust management in distributed systems security, Secure Internet Programming: Issues in Distributed and Mobile Object Systems Lecture Notes in Computer Science, 1603, pp. 184-210, (1999)
[7]
Blaze M., Feignbaum J., Ioannidis J., Keromytis A., The keyNote trust management system-Version 2, Internet Engineering Task Force, (1999)
[8]
Blight D.C., Hamada T., Policy-based networking architecture for QoS interworking in IP management, Proceedings of Integrated Network Management VI, Distributed Management for the Networked Millennium, pp. 811-826, (1999)
[9]
Branstad D., Balenson D., Policy-based cryptographic key management: Experience with the KRP project, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX'00), pp. 103-114, (2000)
[10]
Cholvy L., Cuppens F., Analyzing consistancy of security policies, 1997 IEEE Symposium on Security and Privacy, pp. 103-112, (1997)