[1]
Barkley J F. Comparing simple role based access control models and access control lists. [EB/OL]. (1997).
DOI: 10.1145/266741.266769
Google Scholar
[2]
David Ferraiolo and Richard Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, October 13-16 1992.
Google Scholar
[3]
S. H. von Solms and Isak van der Merwe. The management of computer security profiles using a role-oriented approach. Computer & Security, 13(8): 673-680, (1994).
DOI: 10.1016/0167-4048(94)90049-3
Google Scholar
[4]
Ravi S. Sandhu. The Typed Access Matrix Model. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 122-136, Oakland, CA, May (1992).
DOI: 10.1109/risp.1992.213266
Google Scholar
[5]
Barkely J F, Cincotta A V. Role based access control for the world wide web[EB/OL]. (1998).
Google Scholar
[6]
Al-Shaer E, Hamed H. Firewall Policy Advisor for Anomaly Detection and Rule Editing[C]/Proceedings of IEEE/IFIP IM'03. Colorado Springs, USA: [s. n. ], (2003).
DOI: 10.1109/inm.2003.1194157
Google Scholar
[7]
Al-Shaer E, Hamed H. Design and implementation of firewall policy advisor tools[R].
Google Scholar
[8]
Wool A. A Quantitative Study of Firewall Configuration Errors, [J]. IEEE Computer, 2004, 37(6): 62-67.
DOI: 10.1109/mc.2004.2
Google Scholar
[9]
GOUDA M, LIU X. Firewall Design: Consistency, Completeness, and Compactness[A]. (ICDCS 04) [C], March (2004).
Google Scholar
[10]
CiscoWorks2000 access control list manager 1. 2 overview. November (2000).
Google Scholar
[11]
Taylor D E, Turner J S. ClassBench: A packet classification benchmark. [R]. Saint Louis, USA: Washington University in Saint Louis, Tech. Rep.: WUCSE-2004-28, (2004).
Google Scholar
[12]
Gupta P, McKeown N. Algorithms for Packet Classification: [J]. IEEE Network, 2001, 15(2): 24-32.
Google Scholar
[13]
BABOESCU F, VARGHESE G. Fast and Scalable Conflict Detection for Packet Classifiers. [A]. Proceedings of the 10th IEEE International Conference on Network Protocols[C], (2002).
DOI: 10.1109/icnp.2002.1181414
Google Scholar
[14]
HAN J, KAMBER M. Data Mining: concepts and techniques. [M]. Morgan Kaufmann, (2000).
Google Scholar