A survey of policy refinement methods as a support for sustainable networks
Green sustainability-oriented features have become common in network nodes and
protocols. Running a network in an energy-efficient way is an important concern of network …
protocols. Running a network in an energy-efficient way is an important concern of network …
Generative policy model for autonomic management
D Verma, S Calo, S Chakraborty… - … Advanced & Trusted …, 2017 - ieeexplore.ieee.org
Policy-based mechanisms have been effectively used to realize autonomic behavior in the
constituent elements of distributed systems. However, current prevalent policy models based …
constituent elements of distributed systems. However, current prevalent policy models based …
A survey on addressing privacy together with quality of context for context management in the Internet of Things
Abstract Making the Internet of Things (IoT) a reality will contribute to extend the context-
aware ability of numerous sensitive applications. We can foresee that the context of users …
aware ability of numerous sensitive applications. We can foresee that the context of users …
A rigorous framework for specification, analysis and enforcement of access control policies
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …
They are defined in terms of access control policies regulating the access to system …
[HTML][HTML] A survey of access control models in wireless sensor networks
Wireless sensor networks (WSNs) have attracted considerable interest in the research
community, because of their wide range of applications. However, due to the distributed …
community, because of their wide range of applications. However, due to the distributed …
Data usage control for distributed systems
F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …
used after they have been released and accessed. We address distributed aspects of this …
[HTML][HTML] Real-time verification of wireless home networks using bigraphs with sharing
Home wireless networks are difficult to manage and comprehend because of evolving
locality, co-locality, connectivity and interaction. We define formal models of home wireless …
locality, co-locality, connectivity and interaction. We define formal models of home wireless …
Policy‐Based Security Management System for 5G Heterogeneous Networks
H Alquhayz, N Alalwan, AI Alzahrani… - Wireless …, 2019 - Wiley Online Library
Advances in mobile phone technology and the growth of associated networks have been
phenomenal over the last decade. Therefore, they have been the focus of much academic …
phenomenal over the last decade. Therefore, they have been the focus of much academic …
[PDF][PDF] A policy-based management approach to security in cloud systems.
N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …
complexity, becoming more and more dynamic and distributed, often spanning across …
Data leakage detection using system call provenance
Data leakage has become a problem of epidemic proportions with very serious
consequences for businesses and their customers. Experts warn that it is very difficult for …
consequences for businesses and their customers. Experts warn that it is very difficult for …