Filters








866,640 Hits in 6.6 sec

Concepts and Application of Policy-Based Management [chapter]

B. Alpers, H. Plansky
1995 Integrated Network Management IV  
To fulftl these requirements, we introduce domain-based management policies. Policies allow the specification of management intention on different levels of abstraction.  ...  Finally, we outline two application scenarios in the areas of distributed systems and telecommunication.  ...  Acknowledgements We gratefully acknowledge contributions of our partners in the IDSM and SysMan projects from Bull, Imperial College London, ITTB Fraunhofer Institute, MARl, NTUA, AEG, Alcatel Austria,  ... 
doi:10.1007/978-0-387-34890-2_5 fatcat:dy5oi6csdfg4nlph7lpjlqqwge

Trusted computing update

Marshall D. Abrams, Michael V. Joyce
1995 Computers & security  
This paper presents contemporary thinking about object management and summarizes vertical and horizontal extensions to the Trusted Computing Base (TCB) concept.  ...  This is the second paper of a series of three related papers that examine contemporary information technology concepts.  ...  ACKNOWLEDGMENTS The authors wish to acknowledge the ideas and encouragement received from the anonymous reviewers and colleagues who read prior drafts of this paper: Ed Amoroso, Blaine Burnham,  ... 
doi:10.1016/0167-4048(95)97026-7 fatcat:cftc5invavcy5bqzgz7xmu6lq4

Flexible Management of ANSAware Applications [chapter]

B. Meyer, C. Popien
1995 Open Distributed Processing  
These components of an application also need to be managed. We present a new approach to application management.  ...  Our approach to application management introduces policy controller objects, that enforces policies for policy target objects.  ...  According to the functional management areas, application management requires: accounting management POLICY-BASED APPLICATION MANAGEMENT The following section introduces a policy-based approach to application  ... 
doi:10.1007/978-0-387-34882-7_21 fatcat:ecpnfhwfcfbvlonunv2f2dbjfi

Toward a flexible ontology-based policy approach for network operations using the KAoS framework

Andrzej Uszok, Jeffrey M. Bradshaw, James Lott, Matthew Johnson, Maggie Breedy, Michael Vignati, Keith Whittaker, Kim Jakubowski, Jeffrey Bowcock, Daniel Apgard
2011 2011 - MILCOM 2011 Military Communications Conference  
The ontology-based approach of KAoS policy services provides flexibility in level of abstraction, in mapping to thirdparty policy approaches, and in managing policies across multiple application domains  ...  This paper addresses the challenges of flexible and uniform policy management in complex military network operations.  ...  In contrast to approaches that focus on a particular application niche, the ontology-based approach of KAoS allows it to be easily extended to manage policies across multiple application domains through  ... 
doi:10.1109/milcom.2011.6127447 dblp:conf/milcom/UszokBLJBVWJBA11 fatcat:reqnidpwp5ghbcxo4kqerjoc7m

User-Centered Security Management Of Api-Based Data Integration Workflows

Bojan Suzic
2016 Zenodo  
Presentation of the related paper at IEEE/IFIP NOMS conference 2016.  ...  management is done using dedicated API endpoint  Managing the policyBased on retrieved model, the client instantiates the policy by applying provided concepts and relationships  These policies are  ...  model of policies applicable to particular resources or endpoints  The model represents a range of supported concepts (actions, subjects …)  These concepts may be reused to define security policy   ... 
doi:10.5281/zenodo.1095754 fatcat:gdw6gx5wi5g3zftxoe5muljscy

New thinking about information technology security

Marshall D. Abrams, Michael V. Joyce
1995 Computers & security  
It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control.  ...  Based upon the "divide and conquer" approach to achieving protection, understandability, and flexibility, the result is a more flexible solution than the rigid hierarchical organization identified in the  ...  ACKNOWLEDGMENTS The authors wish to acknowledge the ideas and encouragement received from the anonymous reviewers and colleagues who read prior drafts of this paper: Ed Amoroso, Blaine Burnham, David Gomberg  ... 
doi:10.1016/0167-4048(95)97027-8 fatcat:3uzrc2ddobhcbe66miw4w7rau4

An autonomic architecture to manage Ubiquitous Computing networks and applications

John Strassner, Sven van der Meer, Brendan Jennings, Miguel Ponce de Leon
2009 2009 First International Conference on Ubiquitous and Future Networks  
A machine-understandable representation of business and network concepts, along with an ability to negotiate services and functionality to serve competing interests of users and applications in a domain  ...  This enables the machine-based translation of these objectives into different vendor-specific languages; it also facilitates the use of machine-based learning and reasoning approaches that can be used  ...  ACKNOWLEDGMENT This work is partially sponsored by Science Foundation Ireland under under grant numbers 0/CE/I405 (AMCNS) and 08/SRC/I140 (FAME).  ... 
doi:10.1109/icufn.2009.5174296 fatcat:4jnz2ormkfgp3ksnodf7frudlm

Improving Manageability of Access Control Policies

Jasper Bogaerts, Bert Lagaisse
2014 Engineering Secure Software and Systems  
More specifically, manageability of access control policies becomes more difficult. This leads to administrative overhead and challenges in enforcing a consistent security policy.  ...  The goal of this PhD project is to increase manageability of access control by supporting refinement of application-specific access control policies from explicitly specified organization-wide security  ...  One of the challenges of access control is manageability. Manageability of access control includes user management and management of policies.  ... 
dblp:conf/essos/BogaertsL14 fatcat:fhh76f5sizazdmoyheqinaukwi

Towards policy-based management of sensor networks

Nelson Matthys, Wouter Joosen
2008 Proceedings of the 3rd international workshop on Middleware for sensor networks - MidSens '08  
This paper proposes a policy-based approach that offers a higher level of abstraction to manage these distributed applications in an easier way.  ...  We first give an overview of existing research on policies in traditional middleware and describe some of the shortcomings when applying them for managing sensor networks.  ...  Research for this paper was sponsored by IBBT, the Interdisciplinary institute for BroadBand Technology, and conducted in the context of the IBBT-DEUS project [9] .  ... 
doi:10.1145/1462698.1462701 dblp:conf/middleware/MatthysJ08 fatcat:brbz7xyidvbnrbjve6h7h6trpa

Semantic Matching of Security Policies to Support Security Experts [article]

Othman Benammar, Hicham Elasri, Abderrahim Sekkaki
2013 arXiv   pre-print
This wealth of frameworks and languages make the management task and the interpretation of the security policies so difficult.  ...  Management of security policies has become increasingly difficult given the number of domains to manage, taken into consideration their extent and their complexity.  ...  MANAGEMENT-BASED POLICY PRINCIPLE The objective of the management-based policy is the optimization as well as possible of security experts efforts.  ... 
arXiv:1303.7085v1 fatcat:dbhjeqozyzejtevk22h2olz2fe

An Architecture for Autonomic Management of Ambient Networks [chapter]

Marcos A. Siqueira, Fabio L. Verdi, Rafael Pasquini, Mauricio F. Magalhães
2006 Lecture Notes in Computer Science  
This paper proposes an architecture for Ambient Networks (AN) management, which is based on components such as Autonomic Networking and Policy Based Network Management.  ...  In the proposed architecture, all these functionalities are controlled by a distributed policy-based system, allowing network configuration based on business policies.  ...  As a new approach, Autonomic Networking and Policy-Based Network Management concepts are employed forming the base of the proposed architecture.  ... 
doi:10.1007/11880905_21 fatcat:rkt4f2nhrjcz7jpnynbxdjiicq

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
2013 International Journal of Security and Its Applications  
The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  Choosing choice of middleware system is that is a development language with good portability developed and applied by B/S. These can improve the platform portability of the application systems.  ...  In order to generate the end-user data collection of operations, user-specified data set is influenced by permission set of rights management system based on RBAC and policy set of context-based policy  ... 
doi:10.14257/ijsia.2013.7.6.07 fatcat:ls47dplocbcd7feetif7opapte

Semantic-based policy management for cloud computing environments

Hassan Takabi, James B.D. Joshi
2012 International Journal of Cloud Computing  
We present the framework and describe its components. Furthermore, we present a proof of concept implementation and results of performance evaluation.  ...  In this paper, we introduce a semantic-based policy management framework that is designed to give users a unified control point for managing policies that control access to their data no matter where the  ...  In a policy management system, access rules are specified based on representations of concepts and policy rules and these representations should be able to make policy-based authorisation decisions.  ... 
doi:10.1504/ijcc.2012.046717 fatcat:jvnrlakt3rhzzp2iho5xi6frye

Policy Cycle-Based E-Government Architecture for Policy-Making Organisations of Public Administrations

Konrad Walser, Reinhard Riedl
2011 International Journal of E-Services and Mobile Applications  
The focus was placed on the derivation of processes and their IT support on the basis of the policy-cycle concept.  ...  This article outlines a business and application architecture for policy-making organisations of public administrations.  ...  and unique concept of policy-making organisations exists that could serve as a basis for the specification of architectures.  ... 
doi:10.4018/jesma.2011070104 fatcat:rjwgnfuvjnfetgtnjquu3xwacy

Implementing configuration management policies for distributed applications

Gerald Krause, Martin Zimmermann
1996 Distributed Systems Engineering  
The central purpose of this paper is to present a novel framework supporting the specification and the implementation of configuration management policies for distributed applications.  ...  To reduce management complexity, we introduce a technique which permits the definition of configuration management policies as an integral part of an application specification.  ...  On top of this functionality, a rule based language is provided which supports the specification of management policy rules.  ... 
doi:10.1088/0967-1846/3/2/003 fatcat:6qv7tihgfjbqfpy45mxylbaa2a
« Previous Showing results 1 — 15 out of 866,640 results