Managing security policies: Modeling, verification and configuration

Managing security policies: Modeling, verification and configuration. J. High Speed Networks, 15(3):207-208, 2006. [doi]

Abstract

Abstract is missing.