Sciweavers

518 search results - page 44 / 104
» On Automating Networked Enterprise Management
Sort
View
MIDDLEWARE
2010
Springer
15 years 8 days ago
Adapting Distributed Real-Time and Embedded Pub/Sub Middleware for Cloud Computing Environments
Enterprise distributed real-time and embedded (DRE) publish/subscribe (pub/sub) systems manage resources and data that are vital to users. Cloud computing—where computing resourc...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...
131
Voted
POLICY
2001
Springer
15 years 6 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
125
Voted
COMPSAC
2003
IEEE
15 years 7 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
117
Voted
IJHCI
2002
90views more  IJHCI 2002»
15 years 1 months ago
Awareness of Organizational Expertise
This article describes automated tools for increasing organizational awareness within a global enterprise. The MITRE Corporation is the context for the current work, however the t...
Mark T. Maybury, Raymond J. D'Amore, David House
101
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...