Sciweavers

581 search results - page 41 / 117
» policy 2009
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
JSSPP
2009
Springer
14 years 3 months ago
Decentralized Grid Scheduling with Evolutionary Fuzzy Systems
In this paper, we address the problem of finding workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a n...
Alexander Fölling, Christian Grimme, Joachim ...
ACSAC
2009
IEEE
14 years 23 days ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
BPSC
2009
190views Business» more  BPSC 2009»
13 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
SIGMETRICS
2009
ACM
14 years 3 months ago
Surprising results on task assignment in server farms with high-variability workloads
This paper investigates the performance of task assignment policies for server farms, as the variability of job sizes (service demands) approaches infinity. Our results reveal th...
Mor Harchol-Balter, Alan Scheller-Wolf, Andrew R. ...