[BARTAL, Y.—MAYER, A.—NISSIM, K.—WOOL, A.: Firmato: a Novel Firewall Management Toolkit, IEEE Symposium on Security and Privacy, 1999, pp. 17-31.]Search in Google Scholar
[MAYER, A.—WOOL, A.—ZISKIND, E. Fang: a Firewall Analysis Engine : In Proc. of the IEEE Symposium on Security and Privacy, 2000.]Search in Google Scholar
[HASSAN, A.—HUDEC, L.: Role Based Network Security Model: A Forward Step Towards Firewall Management, In Workshop on Security of Information Technologies, Algiers, 2003.]Search in Google Scholar
[El KALAM, A. A.—El BAIDA, R.—BALBIANI, P.—BENFERHAT, S.—CUPPENS, F.—DESWARTE, Y.—MIEGE, A.—SAUREL, C.—TROUESSIN, G.: Organization Based Access Control, In Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Come, Italy, June 2003, pp. 120-134.]Search in Google Scholar
[GHORBEL-TALBI, M.—CUPPENS, F.—CUPPENS, N.—BOULAHIA, A.: Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communication (ADCOM'07), Guwahati, Inde, December 2007.10.1109/ADCOM.2007.105]Search in Google Scholar
[MIEGE, A.: Definition of a Formal Framework for Specifying Security Policies. The Or-BAC Model and Extensions, PhD thesis, Ecole Nationale Superieure des Telecommunications, 2005.]Search in Google Scholar
[CUPPENS, F.—CUPPENS, N. SANS, T.—MIEGE, A.: A Formal Approach to Specify and Deploy a Network Security Policy, In Proc. of the 2nd Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France, August 2004.]Search in Google Scholar
[KANGASLUOMA, M.: Policy Specification Languages, Report of Helsinki University of Technology, Helsinki, Finland, November 1999.]Search in Google Scholar
[JOHNSON, M.—CHANG, P.—JEFFERS, R.—BRADSHAW, J. et al: KAoS Semantic Policy and Domain Services: an Application of DAML to Web Services-Based Grid Architectures, In Proc. of the AAMAS 03 Workshop on Web Services and Agent-Based Engineering, Melbourne, Australia, July 2003.10.1007/0-387-23344-X_6]Search in Google Scholar
[The Web Ontology Language (OWL) http://www.w3.org/TR/owl-ref/]Search in Google Scholar
[HOAGLAND, J. et al: Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California, Davis Department of Computer Science, 1998.]Search in Google Scholar
[BLAZE, M.—FEIGENBAUM, J.—IOANNIDIS, J.—KEROMYTIS, A. D.: In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag, New York, NY, USA, 1999, pp. 185-210.10.1007/3-540-48749-2_8]Search in Google Scholar
[BLAZE, M.—FEIGENBAUM, J.—KEROMYTIS, A.: Keynote: Trust Management for Publc-Key Infrastructures, In Proc. of the Security Protocls International Workshop, Cambridge, England, Springer-Verlag LNCS, April 1998, pp. 59-63.10.1007/3-540-49135-X_9]Search in Google Scholar
[HINE, J.—YAO, W.—BACON, J.—MOODY, K.: An Architecture for Distributed OASIS Services, In Proc. of the Middleware 2000, New York, USA, Lecture Notes in Computer Science, Springer-Verlag, April 2000, pp. 107-123.10.1007/3-540-45559-0_6]Search in Google Scholar
[DAMIANOU, N.: A Policy Framework for Management of Distributed Systems, PhD thesis, University of London, 2002.]Search in Google Scholar
[LU, F.: Enforcing Ponder Policies using Kava, Master thesis, Victoria University of Wellington, 2004.]Search in Google Scholar