Sciweavers

294 search results - page 7 / 59
» Conflict Analysis for Management Policies
Sort
View
IM
2007
13 years 9 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
BTW
2007
Springer
189views Database» more  BTW 2007»
14 years 1 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
IWAN
1999
Springer
14 years 3 hour ago
Policy Specification for Programmable Networks
There is a need to be able to program network components to adapt to application requirements for quality of service, specialised application dependent routing, to increase effici...
Morris Sloman, Emil Lupu
JCS
2006
118views more  JCS 2006»
13 years 7 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
CODAS
2001
100views more  CODAS 2001»
13 years 9 months ago
Set-Based Access Conflicts Analysis of Concurrent Workflow Definition
An error-comprising workflow dejinition might provoke serious problems to an enterprise especially when it is involved with mission critical business processes. Concurrency of wor...
Minkyu Lee, Dongsoo Han, Jaeyong Shim