3Cohen R.On the establishment of an access VPN in broadband access networks[J].Communications Magazine,IEEE February 2003,41(2):156-163. 被引量:1
4Kent S,Atkinson R.Security architecture for the internet protocol[S].RFC2401,November 1998. 被引量:1
5Dierks T,Allen C.The TLS protocol version 1.0[S].RFC2246,January 1999. 被引量:1
6Rescorla E,Schiffman A.The secure HyperText transfer protocol[S].RFC2660,August 1999. 被引量:1
7Sandhu R S,Coyne E J,Feinstein H,Youman C.Role-based access control models[J].IEEE Computer,1996,29(2):38-47. 被引量:1
8Dimitrakos T,Djordjevic I,Matthews B,et al.Policy-driven access control over a distributed firewall architecture[J].Policies for Distributed Systems and Networks,2002:228-231. 被引量:1
9Jason J,Rafalow L,Vyncke E.IPSec configuration policy information model[S].RFC3585,August 2003. 被引量:1
10Xin Guo,Kun Yang,Galis A,et al.A Policy-based network management system for IP VPN[C].Communication Technology Proceedings,2003.ICCT 2003.2003,(2):1630-1633. 被引量:1