Sciweavers

83 search results - page 13 / 17
» Programmable accounting management for virtual private netwo...
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 4 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
CLOUDCOM
2009
Springer
14 years 4 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
COBUILD
1998
Springer
14 years 1 months ago
An Agent-Based Telecooperation Framework
Abstract. As the amount of information and communication increases dramatically new working environments must provide efficient mechanisms to maximize the benefits of these develop...
Albrecht Schmidt, Alexander Specker, Gerhard Parts...
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
AIMS
2007
Springer
14 years 4 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings