1Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360
2Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230
3Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439
4Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414
5Wies R. Using a classification of management policies for policy specification and policy transformation [ C ]//Integrated Network Management. London : Chapman Hill, 1995:44 - 56
6Katri Ylitalo. Policy core information model[ EB/OL]. 2000. http://www. cs. helsinki. fi/u/kraatika/Courses/QoS00a/ylitalo. pdf
7Kim S Y, Kim M E, Kim K, et al. Information model for policybased network security management [ C ]// Wired Communications and Management. Berlin:Springer, 2002, 2343: 662- 672
8Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism [ C ] //Information Security and Cryptology. Berlin: Springer, 2006,4318: 168 - 181
9Bartal Y, Mayer A J, Nissim K, et al. Firmato: a novel firewall management toolkit [ J]. ACM Transactions on Computer Systems, 2004, 22(4) :381 -420
10Luck I, Schafer C, Krumm H. Model-based tool assistance for packet-filter design [ C ]// Policies for Distributed Systems and Networks. Berlin : Springer, 2001 : 120 - 136