Sciweavers

868 search results - page 44 / 174
» Resiliency policies in access control
Sort
View
SACMAT
2006
ACM
15 years 5 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SAC
2010
ACM
15 years 6 months ago
MetaSelf: an architecture and a development method for dependable self-* systems
This paper proposes a software architecture and a development process for engineering dependable and controllable self-organising (SO) systems. Our approach addresses dependabilit...
Giovanna Di Marzo Serugendo, John S. Fitzgerald, A...
DATE
2008
IEEE
101views Hardware» more  DATE 2008»
15 years 6 months ago
Resilient Dynamic Power Management under Uncertainty
With the increasing levels of variability and randomness in the characteristics and behavior of manufactured nanoscale structures and devices, achieving performance optimization u...
Hwisung Jung, Massoud Pedram
APNOMS
2006
Springer
15 years 3 months ago
GMPLS-Based VPN Service to Realize End-to-End QoS and Resilient Paths
We propose hierarchically distributed path computation elements (HDPCEs) that manage a multilayered GMPLS network and provide traffic engineering paths for end-to-end routes. We ap...
Hiroshi Matsuura, Kazumasa Takami
ICDCSW
2008
IEEE
15 years 6 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar