Sciweavers

715 search results - page 106 / 143
» On Run-Time Enforcement of Policies
Sort
View
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
15 years 3 months ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
INFOCOM
2000
IEEE
15 years 2 months ago
Differentiated Admission Control in Large Networks
Abstract—This paper proposes a simple but effective admission control algorithm for integrated services packet networks. The admission control scheme, based on stochastic control...
Cedric Adjih, Philippe Jacquet, Philippe Robert
MA
1999
Springer
96views Communications» more  MA 1999»
15 years 2 months ago
CPU Resource Control for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support ef...
Raju Pandey, Manoj Lal
MAS
1998
Springer
152views Communications» more  MAS 1998»
15 years 2 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
ETRICS
2006
15 years 1 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...