Sciweavers

488 search results - page 3 / 98
» Policy-Based Cryptography and Applications
Sort
View
POLICY
2004
Springer
13 years 11 months ago
Policy-Based Autonomic Control Service
Recently, there has been a considerable interest in policy-based, goal-oriented service management and autonomic computing. Much work is still required to investigate designs and ...
N. Badr, A. Taleb-Bendiab, D. Reilly
ACSAC
2003
IEEE
13 years 11 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
ASWEC
2008
IEEE
14 years 7 days ago
A Survey of Policy-Based Management Approaches for Service Oriented Systems
Policy based management in Service Oriented Architecture (SOA) allows organizations to apply rules and regulations on their business processes. Policy has long been employed in th...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...
INFOCOM
2006
IEEE
13 years 11 months ago
Policy-Based Resource Management and Service Provisioning in GMPLS Networks
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...
GLOBECOM
2006
IEEE
13 years 11 months ago
A Distributed Policy Based Solution in a Fault Management Scenario
– The Madeira project, part of the Celtic Initiative1 , investigates the use of a fully distributed, policy-based network management framework that exploits the peer-to-peer para...
Ricardo Marin, Julio Vivero, Hai Nguyen, Joan Serr...