Journal: J. High Speed Networks

Volume 15, Issue 3

207 -- 208. Managing security policies: Modeling, verification and configuration
209 -- 227Hazem Hamed, Ehab Al-Shaer. On autonomic optimization of firewall policy organization
229 -- 245Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington. Client-side access control enforcement using trusted computing and PEI models
247 -- 260Romain Laborde, François Barrère, Abdelmalek Benzekri. Network security policy refinement process: Expression and analysis
261 -- 273Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart. Reconfiguring Role Based Access Control policies using risk semantics
275 -- 289Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu. IPsec/VPN security policy correctness and assurance
291 -- 300Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma. An autonomic approach for managing security and identity management policies in enterprises
301 -- 313Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O Connor, John P. Morrison. Supporting heterogeneous middleware security policies in WebCom
315 -- 327Lu ay A. Wahsheh, Jim Alves-Foss. Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems