Sciweavers

948 search results - page 41 / 190
» Analysis of SITA policies
Sort
View
GLOBECOM
2008
IEEE
14 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
HPDC
2000
IEEE
15 years 2 months ago
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness
While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative s...
Bianca Schroeder, Mor Harchol-Balter
COMPSAC
2010
IEEE
14 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
70
Voted
IEEEARES
2007
IEEE
15 years 4 months ago
Pastures: Towards Usable Security Policy Engineering
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
ICCSA
2003
Springer
15 years 3 months ago
An Enhanced Hand-Off Policy to Reduce Blocking Probability in Two-Layer Wireless Systems
Abstract. In this paper, we consider a two-layer hierarchy, ı.e. micro and umbrella layer, cellular system, and propose a new hand-off mechanism to minimize call blocking probabil...
Tae-Jin Lee