Sciweavers

3605 search results - page 138 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
IANDC
2008
140views more  IANDC 2008»
13 years 8 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
JSW
2008
122views more  JSW 2008»
13 years 8 months ago
Security of Distributed Digital Criminal Dossiers
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...
HPCA
2011
IEEE
12 years 12 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
ICAC
2008
IEEE
14 years 2 months ago
Generating Adaptation Policies for Multi-tier Applications in Consolidated Server Environments
Creating good adaptation policies is critical to building complex autonomic systems since it is such policies that define the system configuration used in any given situation. W...
Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltune...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
14 years 15 days ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...