Sciweavers

132 search results - page 17 / 27
» Asynchronous policy evaluation and enforcement
Sort
View
AINA
2006
IEEE
14 years 2 months ago
Model-based Management of Embedded Service Systems - An Applied Approach
The automatic integration of devices into dynamic, automatically configured networks alone does not take advantage of the entire potential of Service Oriented Architectures (SOA)...
Stefan Illner, Heiko Krumm, Ingo Lück, Andre ...
ACSAC
2006
IEEE
14 years 2 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
WSC
2004
13 years 10 months ago
A Near Optimal Approach to Quality of Service Data Replication Scheduling
This paper describes an approach to real-time decisionmaking for quality of service based scheduling of distributed asynchronous data replication. The proposed approach addresses ...
Kevin Adams, Denis Gracanin, Dusan Teodorovic
SEC
2007
13 years 10 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
AAMAS
2005
Springer
14 years 2 months ago
Towards Time Management Adaptability in Multi-agent Systems
Abstract. So far, the main focus of research on adaptability in multiagent systems (MASs) has been on the agents’ behavior, for example on developing new learning techniques and ...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...