Sciweavers

158 search results - page 17 / 32
» Decentralizing SDN Policies
Sort
View
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 5 months ago
Guidelines for Setting Organizational Policies for Data Quality
: From a process perspective, the tasks that individuals carry out within an organization are linked. These linkages are often documented as process flow diagrams that connect the ...
Rajiv M. Dewan, Veda C. Storey
ATC
2009
Springer
15 years 2 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
POLICY
2009
Springer
15 years 5 months ago
Abductive Authorization Credential Gathering
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s p...
Moritz Y. Becker, Jason F. Mackay, Blair Dillaway
COLCOM
2007
IEEE
15 years 5 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
IEEEIAS
2007
IEEE
15 years 5 months ago
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses R...
Yue Zhang 0002, James B. D. Joshi