Sciweavers

488 search results - page 2 / 98
» Policy-Based Cryptography and Applications
Sort
View
POLICY
2001
Springer
13 years 9 months ago
Issues in Managing Soft QoS Requirements in Distributed Systems Using a Policy-Based Framework
Abstract. We address the problem of Quality of Service (QoS) requirements for multimedia applications (e.g., distance education, telemedicine, electronic commerce). These applicati...
Hanan Lutfiyya, Gary Molenkamp, Michael Katchabaw,...
CSREASAM
2003
13 years 6 months ago
Implementing Policy-Based Content Filtering for Web Servers
: Web servers dominate our view of the Web today. Security provided by them has been implemented with varying degrees of success. Web servers are frequently successfully attacked, ...
Tony White, Eugen Bacic
DSN
2006
IEEE
13 years 11 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
ICT
2004
Springer
139views Communications» more  ICT 2004»
13 years 10 months ago
A XML Policy-Based Approach for RSVP
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero
DSOM
2005
Springer
13 years 10 months ago
An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation
Presently, there is no satisfactory model for dealing with political autonomy of agents in policy based management. A theory of atomic policy units called ‘promises’ is therefo...
Mark Burgess