Sciweavers

573 search results - page 51 / 115
» The Policy Machine for Security Policy Management
Sort
View
ICN
2001
Springer
15 years 2 months ago
Management and Realization of SLA for Providing Network QoS
We consider an SLA (Service Level Agreement) committed between two parties to use the guarantee of QoS provided by a QoS Enabled Network (QEN). QEN can provide guarantee of QoS bec...
Manzoor Hashmani, Mikio Yoshida, Takeshi Ikenaga, ...
AIMS
2009
Springer
15 years 4 months ago
Knowledge Management and Promises
Ontological modelling for machine inference has featured prominently in IT management research recently, but there is more immediate scope for knowledge modelling in the realm of h...
Mark Burgess
SIN
2009
ACM
15 years 4 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...
LISA
2007
15 years 3 days ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...
CCS
2005
ACM
15 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone