Sciweavers

STTT
2008
134views more  STTT 2008»
13 years 11 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
SIGMETRICS
2008
ACM
13 years 11 months ago
Scheduling despite inexact job-size information
Motivated by the optimality of Shortest Remaining Processing Time (SRPT) for mean response time, in recent years many computer systems have used the heuristic of "favoring sm...
Adam Wierman, Misja Nuyens
ORL
2008
67views more  ORL 2008»
13 years 11 months ago
Bounds on the performance of back-to-front airplane boarding policies
We provide bounds on the performance of back-to-front airplane boarding policies. In particular, we show that no back-to-front policy can be more than 20% better than the policy w...
Eitan Bachmat, Michael Elkin
ENTCS
2007
128views more  ENTCS 2007»
13 years 11 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
KI
2008
Springer
13 years 11 months ago
Repairing Decision-Theoretic Policies Using Goal-Oriented Planning
In this paper we address the problem of how decision-theoretic policies can be repaired. This work is motivated by observations made in robotic soccer where decisiontheoretic polic...
Christoph Mies, Alexander Ferrein, Gerhard Lakemey...
JHSN
2006
95views more  JHSN 2006»
13 years 11 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
DKE
2007
151views more  DKE 2007»
13 years 11 months ago
Towards a context-based multi-type policy approach for Web services composition
The objective of this research work is to look into the role of policies and context in framing the composition of Web services. Context supports the development of adaptable Web ...
Zakaria Maamar, Djamal Benslimane, Philippe Thiran...
JCP
2006
106views more  JCP 2006»
13 years 11 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JCS
2008
88views more  JCS 2008»
13 years 11 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 11 months ago
Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm
— This paper explores optimization of paging and registration policies in cellular networks. Motion is modeled as a discrete-time Markov process, and minimization of the discount...
Bruce Hajek, Kevin Mitzel, Sichao Yang