Sciweavers

368 search results - page 8 / 74
» Policy Based SLA Management in Enterprise Networks
Sort
View
POLICY
2009
Springer
14 years 2 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
IM
2007
13 years 9 months ago
Automated Availability Management Driven by Business Policies
—Policy-driven service management helps reduce IT management cost and it keeps the service management aligned with business objectives. While most of the previous research focuse...
Zhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. ...
WOSP
2010
ACM
14 years 2 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi
NDSS
2006
IEEE
14 years 1 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...