3Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360
4Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230
5Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439
6Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414
7Wies R. Using a classification of management policies for policy specification and policy transformation [ C ]//Integrated Network Management. London : Chapman Hill, 1995:44 - 56
8Katri Ylitalo. Policy core information model[ EB/OL]. 2000. http://www. cs. helsinki. fi/u/kraatika/Courses/QoS00a/ylitalo. pdf
9Kim S Y, Kim M E, Kim K, et al. Information model for policybased network security management [ C ]// Wired Communications and Management. Berlin:Springer, 2002, 2343: 662- 672
10Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism [ C ] //Information Security and Cryptology. Berlin: Springer, 2006,4318: 168 - 181