-
2
-
-
10944269775
-
Firmato: A novel firewall management toolkit
-
Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst., 22:381-420, 2004.
-
(2004)
ACM Trans. Comput. Syst.
, vol.22
, pp. 381-420
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
6
-
-
80052494019
-
Consumable credentials in logic-based access-control systems
-
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access-control systems. In Proc. of the NDSS, 2007.
-
(2007)
Proc. of the NDSS
-
-
Bowers, K.D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M.K.5
-
7
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
Kyoto, Japan, Aug.
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking control of the enterprise. In Proc. ACM SIGCOMM Conference, Kyoto, Japan, Aug. 2007.
-
(2007)
Proc. ACM SIGCOMM Conference
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
8
-
-
0013243382
-
-
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. The platform for privacy preferences 1.0 (P3P1.0) specification, 2002.
-
(2002)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
9
-
-
34547332637
-
An analysis of p3p-enabled web sites among top-20 search results
-
New York, NY, USA
-
S. Egelman, L. F. Cranor, and A. Chowdhury. An analysis of p3p-enabled web sites among top-20 search results. In ICEC '06: Proceedings of the 8th international conference on Electronic commerce, New York, NY, USA, 2006.
-
(2006)
ICEC '06: Proceedings of the 8th International Conference on Electronic Commerce
-
-
Egelman, S.1
Cranor, L.F.2
Chowdhury, A.3
-
10
-
-
70350656962
-
NOX: Towards and operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. NOX: Towards and operating system for networks. In ACM SIGCOMM Computer Communication Review, July 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
11
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
IEEE Computer Society Press
-
J. D. Guttman. Filtering postures: Local enforcement for global policies. In In Proceedings, 1997 IEEE Symposium on Security and Privacy, pages 120-129. IEEE Computer Society Press, 1997.
-
(1997)
Proceedings 1997 IEEE Symposium on Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
13
-
-
77954330731
-
-
Technical report University of Chicago
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker. Expressing and enforcing flow-based network security policies. Technical report, University of Chicago, 2008.
-
(2008)
Expressing and Enforcing Flow-based Network Security Policies
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
16
-
-
2442512413
-
-
B. Parducci, H. Lockhart, R. Levinson, J. B. Clark, and M. McRae. eXtensible Access Control Markup Language (XACML) specification, 2005.
-
(2005)
EXtensible Access Control Markup Language (XACML) Specification
-
-
Parducci, B.1
Lockhart, H.2
Levinson, R.3
Clark, J.B.4
McRae, M.5
-
18
-
-
0035755688
-
Policy algebras for access control - The predicate case
-
D. Wijesekera and S. Jajodia. Policy algebras for access control - the predicate case. In Proc. ACM CCS, 2001.
-
(2001)
Proc. ACM CCS
-
-
Wijesekera, D.1
Jajodia, S.2
-
19
-
-
14944363872
-
Routing design in operational networks: A look from the inside
-
New York, NY, USA
-
G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson. Routing design in operational networks: A look from the inside. In Proc. ACM SIGCOMM '04, New York, NY, USA, 2004.
-
(2004)
Proc. ACM SIGCOMM '04
-
-
Xie, G.1
Zhan, J.2
Maltz, D.A.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
|