Policy refinement of network services for MANETs

H Zhao, J Lobo, A Roy… - 12th IFIP/IEEE International …, 2011 - ieeexplore.ieee.org
In this paper, we describe a framework for a refinement scheme located in a centralized
policy server that consists of three components: a knowledge database, a refinement rule …

[PDF][PDF] 基于开放逻辑R 反驳计算的访问控制策略精化

吴迎红, 黄皓, 吕庆伟, 曾庆凯, 张迪明 - 软件学报, 2015 - jos.org.cn
策略精化是解决分布式应用访问控制策略配置复杂性的重要方法, 现有精化技术给出了策略分层
描述和逐层精化的方法, 但处理策略之间关联问题的能力不足. 基于精化树描述策略和策略关联 …

[图书][B] Security policy definition and enforcement in distributed systems

H Zhao - 2012 - search.proquest.com
Security in computer systems is concerned with protecting resources from unauthorized
access while ensuring legitimate requests can be satisfied all the time. The recent growth of …

Conflict detection model of access control policy in collaborative environment

B Fan, X Liang, Y Luo, Y Bo… - … on Computational and …, 2011 - ieeexplore.ieee.org
Cross-domain interoperation based on role-mapping increasingly becomes a representative
research field of collaborative environment. However, in this collaborative environment …

Policy-based approach for dynamic architectural adaptation: A case study on location-based system

AA Mansor, WMNW Kadir… - … Malaysian Conference in …, 2011 - ieeexplore.ieee.org
Current research efforts are being directed to commit with the long-term view of self-
management properties for wireless telecommunications. Technology has transformed the …

Autonomic management for personalized handover decisions in heterogeneous wireless networks

JM Kang, JWK Hong - Managing the Dynamics of Networks and Services …, 2011 - Springer
The computation of good and optimal handover decisions is a significant problem in a
heterogeneous network environment. This is exacerbated when the goal is to provide …

Access control policy refinement technology based on open logic r-refutation calculus

吴迎红, 黄皓, 吕庆伟, 曾庆凯, 张迪明 - Journal of Software, 2015 - jos.org.cn
策略精化是解决分布式应用访问控制策略配置复杂性的重要方法, 现有精化技术给出了策略分层
描述和逐层精化的方法, 但处理策略之间关联问题的能力不足. 基于精化树描述策略和策略关联 …

Analysis of adaptive policy-based approach to avoid policy conflicts

AA Mansor, WMNW Kadir, T Anwar… - 2012 19th Asia …, 2012 - ieeexplore.ieee.org
PobMC is an adaptive scalable framework which uses policies to control and adapt the
system behaviour. Moreover, PobMC has the capability to decouple the adaptation concerns …

An improved state transition-based security policy conflict detection algorithm

D Xiangdong, C Xingyuan, W Yongliang… - 2010 International …, 2010 - ieeexplore.ieee.org
Security policy is the core to ensure the system operating safely, security policy conflict will
cause the system to suffer a security threaten, which even make system crash, therefore …

[PDF][PDF] An Adaptive Policy-Based Approach for Static and Dynamic Policy Conflict Detection: An Implementation of Location-Based System

AA Mansor, WMNW Kadir, T Anwar… - … Journal of Digital …, 2012 - researchgate.net
The new paradigm in mobile services lies in providing a location-based user experience
and here lies the tremendous scope for expansion of location-based services (LBS). One of …