Sciweavers

630 search results - page 2 / 126
» Acceptable internet use policy
Sort
View
AH
2008
Springer
13 years 11 months ago
Flexible Adaptivity in AEHS Using Policies
Arne Wolf Koesling, Daniel Krause, Eelco Herder
ICDCIT
2005
Springer
13 years 11 months ago
Validation of Policy Integration Using Alloy
Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Manachai Toahchoodee, Indrakshi Ray
ECOWS
2009
Springer
13 years 12 months ago
Indirect Reciprocity in Policy-Based Helping Experiments
—In service-oriented architectures, participants keep interacting by exchanging tasks, in order to increase their benefit. Since carrying out a task incurs costs, and participan...
Christian von der Weth, Klemens Böhm, Thorben...
NGC
2000
Springer
13 years 9 months ago
Policies for using replica groups and their effectiveness over the Internet
Replication is known to offer high availability in the presence of failures. This paper considers the case of a client making invocations on a group of replicated servers. It iden...
G. Morgan, P. D. Ezilchelvan
INFOCOM
2008
IEEE
13 years 11 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners