Sciweavers

715 search results - page 57 / 143
» On Run-Time Enforcement of Policies
Sort
View
ICDCS
2002
IEEE
14 years 1 months ago
Design of a Policy-Driven Middleware for Secure Distributed Collaboration
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
APNOMS
2006
Springer
14 years 22 days ago
Configuration Management Policy in QoS-Constrained Grid Networks
Abstract. In Grid service, resource management is important to support capability for good quality and efficiency for the computing and storage service. In order to provide this re...
Hyewon Song, Chan-Hyun Youn, Changhee Han, Youngjo...
ACSAC
2006
IEEE
14 years 22 days ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
AINA
2010
IEEE
14 years 2 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
CCS
2009
ACM
14 years 9 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo