Sciweavers

715 search results - page 106 / 143
» On Run-Time Enforcement of Policies
Sort
View
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
14 years 17 days ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
INFOCOM
2000
IEEE
14 years 9 hour ago
Differentiated Admission Control in Large Networks
Abstract—This paper proposes a simple but effective admission control algorithm for integrated services packet networks. The admission control scheme, based on stochastic control...
Cedric Adjih, Philippe Jacquet, Philippe Robert
MA
1999
Springer
96views Communications» more  MA 1999»
13 years 12 months ago
CPU Resource Control for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support ef...
Raju Pandey, Manoj Lal
MAS
1998
Springer
152views Communications» more  MAS 1998»
13 years 11 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
ETRICS
2006
13 years 11 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...