207 | -- | 208 | . Managing security policies: Modeling, verification and configuration |
209 | -- | 227 | Hazem Hamed, Ehab Al-Shaer. On autonomic optimization of firewall policy organization |
229 | -- | 245 | Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington. Client-side access control enforcement using trusted computing and PEI models |
247 | -- | 260 | Romain Laborde, François Barrère, Abdelmalek Benzekri. Network security policy refinement process: Expression and analysis |
261 | -- | 273 | Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart. Reconfiguring Role Based Access Control policies using risk semantics |
275 | -- | 289 | Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu. IPsec/VPN security policy correctness and assurance |
291 | -- | 300 | Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma. An autonomic approach for managing security and identity management policies in enterprises |
301 | -- | 313 | Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O Connor, John P. Morrison. Supporting heterogeneous middleware security policies in WebCom |
315 | -- | 327 | Lu ay A. Wahsheh, Jim Alves-Foss. Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems |