Sciweavers

591 search results - page 45 / 119
» Embracing policy engineering
Sort
View
EUROSYS
2010
ACM
15 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
HIPC
2007
Springer
15 years 1 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
DGO
2007
96views Education» more  DGO 2007»
14 years 11 months ago
Open standards and the role of politics
A necessary part of digital government is the use of standards that allow for technologies to interconnect and interoperate. A growing debate among the technical and policy commun...
Rajiv C. Shah, Jay P. Kesan
COMCOM
2006
93views more  COMCOM 2006»
14 years 9 months ago
A novel method for QoS provisioning with protection in GMPLS networks
In this paper, a new optimal policy is introduced to determine, adapt, and protect the Generalized MultiProtocol Label Switching (GMPLS) network topology based on the current traf...
Tricha Anjali, Caterina M. Scoglio
VMCAI
2010
Springer
15 years 7 months ago
Model-Checking In-Lined Reference Monitors
Abstract. A technique for elegantly expressing In-lined Reference Monitor (IRM) certification as model-checking is presented and implemented. In-lined Reference Monitors (IRM'...
Meera Sridhar, Kevin W. Hamlen