Sciweavers

IM
2007
14 years 1 months ago
Realising Adaptive Web Services through Automated Policy Refinement
Traditionally policy based management systems have relied on 'engineered' policy refinement to decompose high level
Kevin Carey, Vincent Wade
IM
2007
14 years 1 months ago
Automated Availability Management Driven by Business Policies
—Policy-driven service management helps reduce IT management cost and it keeps the service management aligned with business objectives. While most of the previous research focuse...
Zhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. ...
IM
2007
14 years 1 months ago
Business-Driven Optimization of Policy-Based Management solutions
— We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime maximization of the overall ...
Issam Aib, Raouf Boutaba
IM
2007
14 years 1 months ago
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures
— The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (Simple Policy Language for CIM) that complies with the CIM (Common Inform...
Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jo...
IM
2007
14 years 1 months ago
Planning and Managing the IPTV Service Deployment
Abstract— The deployment of converged services of TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This investment is n...
Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian,...
IM
2007
14 years 1 months ago
Assessing the security of VoIP Services
Humberto J. Abdelnur, Radu State, Isabelle Chrisme...
IM
2007
14 years 1 months ago
An information model for the management of Optical Burst Switched networks
Abstract— The Optical Burst Switching (OBS) paradigm proposes a new set of transmission protocols and network architectures that permits the high-utilization of the raw bandwidth...
Jorge E. López de Vergara, Javier Aracil, J...
IM
2007
14 years 1 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu