Sciweavers

1912 search results - page 101 / 383
» Optimizing interconnection policies
Sort
View
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 1 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
IEEECIT
2010
IEEE
13 years 7 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
CDC
2008
IEEE
104views Control Systems» more  CDC 2008»
14 years 4 months ago
A structured multiarmed bandit problem and the greedy policy
—We consider a multiarmed bandit problem where the expected reward of each arm is a linear function of an unknown scalar with a prior distribution. The objective is to choose a s...
Adam J. Mersereau, Paat Rusmevichientong, John N. ...
ICCCN
2008
IEEE
14 years 4 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler
APSCC
2009
IEEE
14 years 2 months ago
Extended policies for automatic service composition in IMS
— Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in Next Generati...
Cuiting Huang, Noël Crespi