Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

ViBe: a powerful random technique to estimate the background in video sequences

O Barnich… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Background subtraction is a crucial step in many automatic video content analysis
applications. While numerous acceptable techniques have been proposed so far for …

Policy-based management: A historical perspective

R Boutaba, I Aib - Journal of Network and Systems Management, 2007 - Springer
This paper traces the history of policy-based management and how it evolved from the first
security models dating back to the late 1960's until today's more elaborate frameworks …

Expressive policy analysis with enhanced system dynamicity

R Craven, J Lobo, J Ma, A Russo, E Lupu… - Proceedings of the 4th …, 2009 - dl.acm.org
Despite several research studies, the effective analysis of policy based systems remains a
significant challenge. Policy analysis should at least (i) be expressive (ii) take account of …

AMUSE: autonomic management of ubiquitous e‐Health systems

E Lupu, N Dulay, M Sloman, J Sventek… - Concurrency and …, 2008 - Wiley Online Library
Future e‐Health systems will consist of low‐power on‐body wireless sensors attached to
mobile users that interact with an ubiquitous computing environment to monitor the health …

Policy conflict analysis for quality of service management

M Charalambides, P Flegkas, G Pavlou… - … on Policies for …, 2005 - ieeexplore.ieee.org
Policy-based management provides the ability to (re-) configure differentiated services
networks so that desired quality of service (QoS) goals are achieved. Relevant configuration …

Using argumentation logic for firewall configuration management

AK Bandara, AC Kakas, EC Lupu… - 2009 IFIP/IEEE …, 2009 - ieeexplore.ieee.org
Firewalls remain the main perimeter security protection for corporate networks. However,
network size and complexity make firewall configuration and maintenance notoriously …

Using linear temporal model checking for goal-oriented policy refinement frameworks

J Rubio-Loyola, J Serrat… - … on Policies for …, 2005 - ieeexplore.ieee.org
Policy refinement is meant to derive lower-level policies from higher-level ones so that these
more specific policies are better suited for use in different execution environments. Although …

Dynamic policy analysis and conflict resolution for diffserv quality of service management

M Charalambides, P Flegkas, G Pavlou… - 2006 IEEE/IFIP …, 2006 - ieeexplore.ieee.org
Policy-based dynamic resource management may involve interaction between independent
decision-making components which can lead to conflicts. For example, conflicts can occur …

Policy authoring for software-defined networking management

CC Machado, JA Wickboldt, LZ Granville… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
Software-Defined Networking (SDN) permits centralizing part of the decision-logic in
controller devices. Thus, controllers can have an overall view of the network, assisting …