1Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2(4): 333-360
2Stern D F. On the buzzword "security policy"[C] //Proc of 1991 IEEE Symp on Security and Privacy. Los Alamitos: IEEE Computer Society, 1991:219-230
3Breslau L, et al. Advances in network simulation [J]. IEEE Computer, 2000, 33(5): 59-67
4Bill Brown, Andrew Cutts, Dennis McGrath, et al. Simulation of cyber attacks with applications in homeland defense training [C] //SPIE 5071. San Jose: SPIE Press, 2003:63-71
5DeLooze L L, McKean P, Mostow J R, et al. Incorporating simulation into the computer security classroom [EB/OL]. (2001) [2008-01-10]. http://fie. engrng. pitt. edu/fie2004/ papers/1575. pdf
6Liljenstam Michael, Liu Jason, Nicol David, et al. RINSE.. The real-time immersive network simulation Environment for network Security Exercises [C] //Proc of the Workshop on Principles of Advanced and Distributed Simulation. San Diego, CA: Simulation Councils, 2005:119-128
7Li Xiao-Jian, Xia Chun-He, Li Li, et al. A scenario description language of network attack and defense [C] // Proc of the IASTED Asian Conf on Modelling and Simulation. Calgary, Canada: ACTA Press, 2007
8Dulay Damianou N, Lupu E, Sloman M, The ponder policy specification language [G] //LNCS 1995: Proc of the Workshop on Policies for Distributed Systems and Networks Policy. New York: Springer, 2001:18-39
9Ylitalo Katri. Policy core information model [EB]OL]. (2000) [2008-01-10]. http://www. cs. helsinki. fi/u/kraatika/ Courses/QoS00a/ylitalo. pdf
10Condell M, Lynn C, Zao J. Security policy specification language [ EB/OL]. ( 1999-07-01 ) [ 1999-11-15 ]. http://www. ietf. org/internet-drafts/draft-ietf-ipsec-spsl-01.txt