3[1]S.Kent,Atkinson R.Security Architecture for the Internet Protocol[R].RFC-2401.Internet Society,Network Working Group,Nov.1998.
4[2]Sanchez L A,Condell M N.draft-ietf-ipsec-sps-00.txt.Se-c urity Policy System,1998.11.
5[3]Sanchez L A,Condell M N,draft-ietf-ipsp-spp-00.txt.Security Policy Protocol.2000.7,Security Policy Protocol.draft -ietf-ipsp-spp-00.txt,2000-07
6[4]MING X,KRITHI R.Scheduling transactions with temporal con-straints:exploiting data semantics[J].IEEE Transactions onKnowledge and Data Engineering,2002,14(5):1155~1166.
7[6]Chang C L,Chiu Y P,Lei C L,Automatic Generation of Conflict-Free IPsec Policies[A].IFIP International Federation for Information Processing 2005.233~246.
8[7]Yang Y,Martel C U,Wu S F.On Building the Minimal Number of Tunnels-An Ordered-Split approach to mnage IPsec/VPN policies.9th IEEE/IFIP Network,Operations and Management Symposium (NOMS 2004),April 2004.277~290.
9[8]Fu Z,F u W S.Automatic Generation of IPsec/VPN Security Policies in an Intra-Domain Environment[M].12th International Workshop on Distributed Systems:Operations& Management (DSOM 2001),2001.