Sciweavers

82 search results - page 7 / 17
» Dissecting Configuration Management Policies
Sort
View
POLICY
2001
Springer
14 years 1 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
SCM
2001
13 years 10 months ago
Defining and Supporting Concurrent Engineering Policies in SCM
Software Configuration Management addresses roughly two areas, the first and older one concerns the storage of the entities produced during the software project; the second one con...
Jacky Estublier, Sergio Cárdenas-Garc&iacut...
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 10 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
OSDI
2008
ACM
14 years 8 months ago
Taming Heterogeneous NIC Capabilities for I/O Virtualization
The recent emergence of network interface cards (NICs) with diverse hardware features for I/O virtualization poses an important challenge for virtual machine environments, particu...
Jose Renato Santos, Yoshio Turner, Jayaram Mudigon...
SIGUCCS
2005
ACM
14 years 2 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody