Citation: | Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303. |
[1] | Zhang Huanhuan, An Congkai, Zhao Langcheng, Zhou Anfu, Ma Huadong, Yuan Yi, Cao Ning. Algorithmic Intelligence Right Management Method in Video Cloud-Network Platform[J]. Journal of Computer Research and Development, 2023, 60(4): 828-838. DOI: 10.7544/issn1000-1239.202330023 |
[2] | Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646 |
[3] | Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288 |
[4] | Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636. |
[5] | Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941. |
[6] | Hu Jun and Li Zhiang. A Policy-Oriented Cooperation Model in Agent Organization[J]. Journal of Computer Research and Development, 2012, 49(7): 1474-1493. |
[7] | Ning Zhao, Shi Shengfei, Li Jianzhong, Wang Chaokun. Multi-resolution Data Storage Method for Region Query in Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(3): 589-597. |
[8] | Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861. |
[9] | Hu Ning, Zou Peng, and Zhu Peidong. A Cooperative Mechanism for Inter-Domain Routing Management[J]. Journal of Computer Research and Development, 2009, 46(8): 1251-1259. |
[10] | Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114. |