IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
Specifying policies doesn’t occur in splendid isolation but as part of refining an enterprise specification. The roles, the tasks, and the business processes of an ODP community ...
James B. Cole, John Derrick, Zoran Milosevic, Kerr...
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...