메뉴 건너뛰기




Volumn 82, Issue 5, 2006, Pages 295-310

Simulation Verification and Validation by Dynamic Policy Specification and Enforcement

Author keywords

Distributed simulation; dynamic policy enforcement; policy based computing; verification and validation

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; COMPUTER SIMULATION LANGUAGES;

EID: 33748513673     PISSN: 00375497     EISSN: None     Source Type: Journal    
DOI: 10.1177/0037549706068828     Document Type: Article
Times cited : (11)

References (36)
  • 2
    • 0031331432 scopus 로고    scopus 로고
    • Verification, validation, and accreditation of simulation models
    • Balci, O. 1997. Verification, validation, and accreditation of simulation models. In Proceedings of the 1997 Winter Simulation Conference, pp. 135-141.
    • (1997) Proceedings of the 1997 Winter Simulation Conference , pp. 135-141
    • Balci, O.1
  • 3
    • 84993776152 scopus 로고    scopus 로고
    • Defense Modeling and Simulation Office Foundation 02 V&V Workshop
    • Defense Modeling and Simulation Office Foundation 02 V&V Workshop. http://www.dmso.mil/public/transition/vva/foundations
  • 5
    • 0032255085 scopus 로고    scopus 로고
    • Validation and verification of the simulation model of a photolithography process in semiconductor manufacturing
    • Nayani, N., and M. Mollaghasemi. 1998. Validation and verification of the simulation model of a photolithography process in semiconductor manufacturing. In Proceedings of the 1998 Winter Simulation Conference, pp. 1017-1022.
    • (1998) Proceedings of the 1998 Winter Simulation Conference , pp. 1017-1022
    • Nayani, N.1    Mollaghasemi, M.2
  • 7
    • 36749056132 scopus 로고    scopus 로고
    • BizTalk Server Policy. 2002. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/sdk/htm/ebiz_prog_rules_xxxf.asp
    • (2002) BizTalk Server Policy
  • 13
    • 33748516024 scopus 로고    scopus 로고
    • Java policy implementation and policy file syntax
    • Java policy implementation and policy file syntax. http://java.sun.com/j2se/1.4.2/docs/guide/security/PolicyFiles.html
  • 15
    • 27544497210 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science at Helsinki University of Technology, November
    • Kangasluoma, M. 1999. Policy specification languages. Technical report, Department of Computer Science at Helsinki University of Technology, November.
    • (1999) Policy specification languages
    • Kangasluoma, M.1
  • 16
    • 27544438700 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science at Columbia University, May
    • Locasto, M. 2003. SPCL: Structured policy command language. Technical report, Department of Computer Science at Columbia University, May.
    • (2003) SPCL: Structured policy command language
    • Locasto, M.1
  • 17
    • 0004198635 scopus 로고    scopus 로고
    • 3rd ed. Englewood Cliffs, NJ: Prentice Hall
    • Pfleeger, C. 2003. Security in computing. 3rd ed. Englewood Cliffs, NJ: Prentice Hall.
    • (2003) Security in computing
    • Pfleeger, C.1
  • 22
    • 84993693587 scopus 로고    scopus 로고
    • IBM, BEA Systems, Microsoft, SAP AG, Sonic Software, and VeriSign
    • IBM, BEA Systems, Microsoft, SAP AG, Sonic Software, and VeriSign. Web service policy framework. http://www-128.ibm.com/developerworks/library/specification/ws-polfram/
    • Web service policy framework
  • 24
    • 33845494507 scopus 로고    scopus 로고
    • A robust testing framework for verifying Web services by completeness and consistency analysis
    • IEEE International Workshop on Service-Oriented System Engineering (SOSE)October
    • Tsai, W. T., X. Wei, and Y. Chen. 2005. A robust testing framework for verifying Web services by completeness and consistency analysis. In IEEE International Workshop on Service-Oriented System Engineering (SOSE), October, Beijing, pp. 151-158.
    • (2005) , pp. 151-158
    • Tsai, W.T.1    Wei, X.2    Chen, Y.3
  • 25
    • 30344475769 scopus 로고    scopus 로고
    • Developing and assuring trustworthy Web services
    • In the 7th International Symposium on Autonomous Decentralized Systems (ISADS)
    • Tsai, W. T., X. Wei, Y. Chen, B. Xiao, R. Paul, and H. Huang. 2005. Developing and assuring trustworthy Web services. In the 7th International Symposium on Autonomous Decentralized Systems (ISADS), April, pp. 160-167.
    • (2005) , pp. 160-167
    • Tsai, W.T.1    Wei, X.2    Chen, Y.3    Xiao, B.4    Paul, R.5    Huang, H.6
  • 26
    • 27544442301 scopus 로고    scopus 로고
    • Dynamic simulation verification and validation by policy enforcement
    • In the 38th Annual Simulation Symposium, San Diego
    • Tsai, W. T., X. Liu, Y. Chen, and R. Paul. 2005. Dynamic simulation verification and validation by policy enforcement. In the 38th Annual Simulation Symposium, April, San Diego, pp. 91-98.
    • (2005) , pp. 91-98
    • Tsai, W.T.1    Liu, X.2    Chen, Y.3    Paul, R.4
  • 29
    • 0141972444 scopus 로고    scopus 로고
    • RBAC models: Concepts and trends
    • Bertino, E. 2003. RBAC models: Concepts and trends. Computers & Security 22(6): 511-514.
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 511-514
    • Bertino, E.1
  • 30
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S., R. Sandhu, and Q. Nunawer. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2): 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Nunawer, Q.3
  • 36
    • 80052698976 scopus 로고    scopus 로고
    • LUA programming language
    • LUA programming language. www.lua.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.