Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Band ordering in lossless compression of multispectral images

SR Tate - IEEE Transactions on Computers, 1997 - ieeexplore.ieee.org
In this paper, we consider a model of lossless image compression in which each band of a
multispectral image is coded using a prediction function involving values from a previously …

Profact: A provenance-based analytics framework for access control policies

AA Jabal, M Davari, E Bertino, C Makaya… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Policy-based access control systems are crucial for secure information sharing in
collaborative applications. However, policy management needs to be flexible in order to …

Integrating flash-based SSDs into the storage stack

R Appuswamy, DC Van Moolenbroek… - 2012 IEEE 28th …, 2012 - ieeexplore.ieee.org
Over the past few years, hybrid storage architectures that use high-performance SSDs in
concert with high-density HDDs have received significant interest from both industry and …

Dynamic adaptation of policies using machine learning

A Pelaez, A Quiroz, M Parashar - 2016 16th IEEE/ACM …, 2016 - ieeexplore.ieee.org
Managing large systems in order to guarantee certain behavior is a difficult problem due to
their dynamic behavior and complex interactions. Policies have been shown to provide a …

Policy modeling and anomaly detection in ABAC policies

M Davari, M Zulkernine - International Conference on Risks and Security of …, 2021 - Springer
Sensitive data is available online through web and distributed protocols that highlight the
need for access control mechanisms. System designers write access control policies to …

The design of a novel context-aware policy model to support machine-based learning and reasoning

J Strassner, JN de Souza, D Raymer, S Samudrala… - Cluster …, 2009 - Springer
The purpose of autonomic networking is to manage the business and technical complexity of
networked components and systems. However, the lack of a common lingua franca makes it …

Application domain independent policy conflict analysis using information models

S Davy, B Jennings, J Strassner - NOMS 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
A key part of the policy authoring process is analysis of the potential for newly created or
modified policies to conflict with already deployed policies. We propose an approach for …

An efficient policy evaluation engine for XACML policy management

F Deng, Z Yu, W Liu, X Luo, Y Fu, B Qiang, C Xu… - Information Sciences, 2021 - Elsevier
In recent years, XACML (eXtensible Access Control Markup Language) has been widely
used in the development of various applications, especially Web services. The evaluation …

On harnessing information models and ontologies for policy conflict analysis

S Davy, B Jennings, J Strassner - 2009 IFIP/IEEE International …, 2009 - ieeexplore.ieee.org
We present a policy conflict analysis process that makes use of pre-defined semantic
models of an application to perform effective and efficient conflict analysis. The process is …