Sciweavers

21 search results - page 3 / 5
» Using the script MIB for policy-based configuration manageme...
Sort
View
SIGUCCS
2005
ACM
13 years 12 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
SIGMOD
1996
ACM
84views Database» more  SIGMOD 1996»
13 years 10 months ago
Change Detection in Hierarchically Structured Information
Detecting and representing changes to data is important for active databases, data warehousing, view maintenance, and version and configuration management. Most previous work in c...
Sudarshan S. Chawathe, Anand Rajaraman, Hector Gar...
DSOM
2004
Springer
13 years 11 months ago
Defining Reusable Business-Level QoS Policies for DiffServ
This paper proposes a PBNM (Policy Based Network Management) framework for automating the process of generating and distributing DiffServ configuration to network devices. The fram...
André Beller, Edgard Jamhour, Marcelo Eduar...
22
Voted
OSN
2008
97views more  OSN 2008»
13 years 6 months ago
Managing Layer 1 VPN services
Control Plane architectures enhance transport networks with distributed signaling and routing mechanisms which allow dynamic connection control. As a result, layer 1 switching net...
Neumar Malheiros, Edmundo Roberto Mauro Madeira, F...
POLICY
2001
Springer
13 years 10 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...