A survey of policy refinement methods as a support for sustainable networks

AC Riekstin, GC Januario, BB Rodrigues… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Green sustainability-oriented features have become common in network nodes and
protocols. Running a network in an energy-efficient way is an important concern of network …

Generative policy model for autonomic management

D Verma, S Calo, S Chakraborty… - … Advanced & Trusted …, 2017 - ieeexplore.ieee.org
Policy-based mechanisms have been effectively used to realize autonomic behavior in the
constituent elements of distributed systems. However, current prevalent policy models based …

A survey on addressing privacy together with quality of context for context management in the Internet of Things

S Chabridon, R Laborde, T Desprats, A Oglaza… - annals of …, 2014 - Springer
Abstract Making the Internet of Things (IoT) a reality will contribute to extend the context-
aware ability of numerous sensitive applications. We can foresee that the context of users …

A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

[HTML][HTML] A survey of access control models in wireless sensor networks

HA Maw, H Xiao, B Christianson… - Journal of Sensor and …, 2014 - mdpi.com
Wireless sensor networks (WSNs) have attracted considerable interest in the research
community, because of their wide range of applications. However, due to the distributed …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

[HTML][HTML] Real-time verification of wireless home networks using bigraphs with sharing

M Calder, A Koliousis, M Sevegnani… - Science of Computer …, 2014 - Elsevier
Home wireless networks are difficult to manage and comprehend because of evolving
locality, co-locality, connectivity and interaction. We define formal models of home wireless …

Policy‐Based Security Management System for 5G Heterogeneous Networks

H Alquhayz, N Alalwan, AI Alzahrani… - Wireless …, 2019 - Wiley Online Library
Advances in mobile phone technology and the growth of associated networks have been
phenomenal over the last decade. Therefore, they have been the focus of much academic …

[PDF][PDF] A policy-based management approach to security in cloud systems.

N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …

Data leakage detection using system call provenance

A Awad, S Kadry, G Maddodi, S Gill… - … on Intelligent Networking …, 2016 - ieeexplore.ieee.org
Data leakage has become a problem of epidemic proportions with very serious
consequences for businesses and their customers. Experts warn that it is very difficult for …