Sciweavers

318 search results - page 36 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ISPDC
2006
IEEE
14 years 1 months ago
An Agent-Based Approach to Grid Service Monitoring
The centralised management of distributed computing infrastructures presents a number of considerable challenges, not least of which is the effective monitoring of physical resour...
Keith Rochford, Brian A. Coghlan, John Walsh
CCGRID
2006
IEEE
14 years 1 months ago
Learning-Based Negotiation Strategies for Grid Scheduling
One of the key requirement for Grid infrastructures is the ability to share resources with nontrivial qualities of service. However, resource management in a decentralized infrast...
Jiadao Li, Ramin Yahyapour
EUROSYS
2010
ACM
14 years 4 months ago
Barricade: Defending Systems Against Operator Mistakes
In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the ...
Fabio Oliveira, Andrew Tjang, Ricardo Bianchini, R...
SACMAT
2009
ACM
14 years 2 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino