Sciweavers

412 search results - page 22 / 83
» Service Level Agreement Enforcement for Differentiated Servi...
Sort
View
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
14 years 4 months ago
Staffing Software Maintenance and Support Projects
In the past decade outsourcing a software system’s support and maintenance has become relatively common across most organizations. In this paper we consider a few issues governi...
Jai Asundi, Sumit Sarkar
DSOM
2007
Springer
14 years 4 months ago
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework
Abstract. Service Level Agreements (SLA) are needed to allow business interactions to rely on Internet services. Service Level Objectives (SLO) specify the committed performance le...
Hasan, Burkhard Stiller
IEEESCC
2008
IEEE
14 years 5 months ago
Monitoring Dependencies for SLAs: The MoDe4SLA Approach
In service oriented computing different techniques for monitoring Service Level Agreements (SLAs) are available. Many of these monitoring approaches focus on bilateral agreements ...
Lianne Bodenstaff, Andreas Wombacher, Manfred Reic...
POLICY
2005
Springer
14 years 4 months ago
A Model for Usage Policy-Based Resource Allocation in Grids
Challenging usage policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Participants may wi...
Catalin Dumitrescu, Michael Wilde, Ian T. Foster
USENIX
2007
14 years 27 days ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...