Computer Networks and ISDN Systems
Volume 28, Issue 4, February 1996, Pages 499-511
Security policies in OSI-management experiences from the DeTeBerkom project BMSec
References (20)
- et al.
Piloting authentication and security services within OSI applications for RTD information (PASSWORD)
Comput. Networks ISDN Systems
(1992) - et al.
Towards trust-worthy communication systems—experiences with the security toolkit SecuDE
SAMSON—Security And Management Services in Open Networks; Deliverable D2: Top Level Specification of the SAMSON Security Management Architecture
(December 1992)SAMSON—Security And Management Services in Open Networks; Deliverable D3: Detailed Design Specifications
(April 1993)- et al.
Secure remote management
- et al.
Beschreibung einer Sicherheitspolitik
Working Document BMSEC-8
(August 1994)et al.Dynamische Security Policy für Berman
BMSEC-17
(July 1994)
There are more references available in the full text version of this article.
Cited by (3)
Using hierarchal change mining to manage network security policy evolution
2011, USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Hot-ICE 2011A computational framework for certificate policy operations
2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)An implementation of a hierarchical LAN management system based upon analysis of network management operations
1997, IEICE Transactions on Communications
Copyright © 1996 Published by Elsevier B.V.