Conflict detection model of access control policy in collaborative environment

B Fan, X Liang, Y Luo, Y Bo… - … on Computational and …, 2011 - ieeexplore.ieee.org
Cross-domain interoperation based on role-mapping increasingly becomes a representative
research field of collaborative environment. However, in this collaborative environment …

[PDF][PDF] User-centric identity enabled QoS policy management for Next Generation Internet

I Miloucheva, D Wagner, C Niephaus… - International Review on …, 2008 - researchgate.net
Background and architectural considerations for identity enabled user-centric QoS policy
management are discussed. Different strategies for usage of identity information for …

Policy-based approach for dynamic architectural adaptation: A case study on location-based system

AA Mansor, WMNW Kadir… - … Malaysian Conference in …, 2011 - ieeexplore.ieee.org
Current research efforts are being directed to commit with the long-term view of self-
management properties for wireless telecommunications. Technology has transformed the …

Autonomic management for personalized handover decisions in heterogeneous wireless networks

JM Kang, JWK Hong - Managing the Dynamics of Networks and Services …, 2011 - Springer
The computation of good and optimal handover decisions is a significant problem in a
heterogeneous network environment. This is exacerbated when the goal is to provide …

Fuzzy conflict analysis for qos policy parameters in diffserv networks

T Samak, E Al-Shaer - IEEE Transactions on Network and …, 2012 - ieeexplore.ieee.org
Policy-based network management is a necessity for managing large-scale environments. It
provides the means for separating high-level system requirements from the actual …

Design and Implementation of Scalable QoS Policy Management System

W Xie, X Chen, D Li - 2015 IEEE 12th Intl Conf on Ubiquitous …, 2015 - ieeexplore.ieee.org
Around how to design policy-based network management system of QoS, this paper
proposed a system architecture with the QoS policy conflict detection and digestion function …

Security Policy Integration Method for Information Systems

TH Tran, NT Nguyen - 2009 First Asian Conference on …, 2009 - ieeexplore.ieee.org
Policy-based security is an effective and convenient approach to manage information
systems. By this approach, we can handle easily all behaviors of a system thought a set of …

[PDF][PDF] An Adaptive Policy-Based Approach for Static and Dynamic Policy Conflict Detection: An Implementation of Location-Based System

AA Mansor, WMNW Kadir, T Anwar… - … Journal of Digital …, 2012 - researchgate.net
The new paradigm in mobile services lies in providing a location-based user experience
and here lies the tremendous scope for expansion of location-based services (LBS). One of …

Intelligent assistant for context-aware policies

H Balinsky, NCA Moore… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
Recent advancements in document handling tools have greatly simplified the tasks of
reusing content and copying between secure and unsecure locations. As a result, intentional …

Digital Provenance Techniques and Applications

AA Jabal - 2020 - search.proquest.com
This thesis describes a data provenance framework and other associated frameworks for
utilizing provenance for data quality and reproducibility. We first identify the requirements for …