2006
DOI: 10.1007/11937807_14
|View full text |Cite
|
Sign up to set email alerts
|

A Network Security Policy Model and Its Realization Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 5 publications
0
0
0
Order By: Relevance
“…How to evaluate the feasibility of security policies has become a hot research topic in the field of network security, and security policies should maintain completeness, correctness, and consistency [1]. Policy completeness research mainly focuses on the description of user completeness, process and its execution completeness, duty isolation completeness and log completeness in business information systems [2].…”
Section: Introductionmentioning
confidence: 99%
“…How to evaluate the feasibility of security policies has become a hot research topic in the field of network security, and security policies should maintain completeness, correctness, and consistency [1]. Policy completeness research mainly focuses on the description of user completeness, process and its execution completeness, duty isolation completeness and log completeness in business information systems [2].…”
Section: Introductionmentioning
confidence: 99%